IOC Report
SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Remcos\logs.dat
data
dropped
malicious
C:\ProgramData\Remcos\remcos.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Remcos\remcos.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\install.vbs
data
modified
malicious
C:\Users\user\AppData\Local\Temp\tmp2F88.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\remcos.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tkiYKFegXAQjl.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0lvdpu2m.2nc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ui2ztwr.hrs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_avsosc4c.cag.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_btxccmx0.x1c.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eexrukca.qyj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ftrmxaoc.s0r.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fuhm20jg.3d3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gmwfjgpy.o3o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k2pm04w4.o2k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kyijcmah.cvh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nk204d2r.vfw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rvx1ajto.zan.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spgxpask.vh4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vfbn3taw.s2q.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wc3sboll.4wg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wmkji1qz.j5k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3F47.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmp6250.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tmpAE2E.tmp
XML 1.0 document, ASCII text
dropped
Chrome Cache Entry: 122
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 123
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 124
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 125
JSON data
dropped
Chrome Cache Entry: 126
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 127
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 128
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 129
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 130
JSON data
dropped
Chrome Cache Entry: 131
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 132
JSON data
downloaded
Chrome Cache Entry: 133
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 134
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 135
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 136
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 137
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 138
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 139
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
dropped
Chrome Cache Entry: 140
ASCII text, with CRLF line terminators
dropped
Chrome Cache Entry: 141
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 142
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 143
JSON data
dropped
Chrome Cache Entry: 144
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 145
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 146
ASCII text, with very long lines (32896), with no line terminators
dropped
Chrome Cache Entry: 147
JSON data
downloaded
Chrome Cache Entry: 148
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 149
JSON data
downloaded
Chrome Cache Entry: 150
JSON data
dropped
Chrome Cache Entry: 151
JSON data
dropped
Chrome Cache Entry: 152
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 153
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
downloaded
Chrome Cache Entry: 154
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 155
ASCII text, with very long lines (32896), with no line terminators
downloaded
Chrome Cache Entry: 156
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 157
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 158
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 159
Web Open Font Format (Version 2), TrueType, length 19360, version 1.0
downloaded
Chrome Cache Entry: 160
JSON data
dropped
Chrome Cache Entry: 161
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 162
JSON data
downloaded
Chrome Cache Entry: 163
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
There are 64 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tkiYKFegXAQjl" /XML "C:\Users\user\AppData\Local\Temp\tmp2F88.tmp"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user~1\AppData\Local\Temp\install.vbs"
malicious
C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe
C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe
malicious
C:\ProgramData\Remcos\remcos.exe
C:\ProgramData\Remcos\remcos.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tkiYKFegXAQjl" /XML "C:\Users\user\AppData\Local\Temp\tmp3F47.tmp"
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tkiYKFegXAQjl" /XML "C:\Users\user\AppData\Local\Temp\tmp6250.tmp"
malicious
C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe
"C:\Users\user\AppData\Roaming\tkiYKFegXAQjl.exe"
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tkiYKFegXAQjl" /XML "C:\Users\user\AppData\Local\Temp\tmpAE2E.tmp"
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=2012,i,4708018134901334635,12688570153160529703,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=2024,i,15113330487457257710,6273278388839186901,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=2004,i,4967517271708772369,15990879581849907844,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 28 hidden processes, click here to show them.

URLs

Name
IP
Malicious
l.dynamic-dns.net
malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
http://tempuri.org/DataSet1.xsd
unknown
https://aka.ms/certhelp
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.253.72
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://github.com/Youssef1313
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://github.com/nschonni
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://geoplugin.net/json.gp/C
unknown
http://geoplugin.net/json.gpJ
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://geoplugin.net/json.gpN
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://aka.ms/aiskillschallenge/T1LearnBanner?wt.mc_id=aisc25_learnpromo1_website_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2017-0
unknown
https://github.com/js-cookie/js-cookie
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://schema.org/Organization
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://channel9.msdn.com/
unknown
https://github.com/dotnet/try
unknown
There are 36 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cjmancool.dynamic-dns.net
154.127.53.209
malicious
js.monitor.azure.com
unknown
malicious
mdec.nelreports.net
unknown
malicious
s-part-0044.t-0009.fb-t-msedge.net
13.107.253.72
s-part-0016.t-0009.fb-t-msedge.net
13.107.253.44
geoplugin.net
178.237.33.50
s-part-0017.t-0009.fb-t-msedge.net
13.107.253.45
www.google.com
142.250.185.132

IPs

IP
Domain
Country
Malicious
154.127.53.209
cjmancool.dynamic-dns.net
South Africa
malicious
192.168.2.7
unknown
unknown
malicious
192.168.2.6
unknown
unknown
192.168.2.23
unknown
unknown
13.107.253.44
s-part-0016.t-0009.fb-t-msedge.net
United States
13.107.253.45
s-part-0017.t-0009.fb-t-msedge.net
United States
142.250.185.132
www.google.com
United States
13.107.253.72
s-part-0044.t-0009.fb-t-msedge.net
United States
239.255.255.250
unknown
Reserved
192.168.2.14
unknown
unknown
178.237.33.50
geoplugin.net
Netherlands
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Remcos
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Remcos
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Rmc-GP2WRC
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-GP2WRC
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-GP2WRC
WD
HKEY_CURRENT_USER\SOFTWARE\Rmc-GP2WRC
WD
HKEY_CURRENT_USER\SOFTWARE\Rmc-GP2WRC
WD

Memdumps

Base Address
Regiontype
Protect
Malicious
35D43000
heap
page read and write
malicious
F67000
heap
page read and write
malicious
4A46000
trusted library allocation
page read and write
malicious
FDA000
heap
page read and write
malicious
E17000
heap
page read and write
malicious
E77000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3FC7000
trusted library allocation
page read and write
malicious
E2A000
heap
page read and write
malicious
E56000
heap
page read and write
malicious
13D7000
heap
page read and write
malicious
2B4F000
stack
page read and write
malicious
E8C000
heap
page read and write
malicious
4087000
trusted library allocation
page read and write
malicious
35D2E000
heap
page read and write
malicious
4968000
trusted library allocation
page read and write
malicious
7298F000
stack
page read and write
3463E000
stack
page read and write
45F3E000
stack
page read and write
39DFE000
stack
page read and write
308F000
stack
page read and write
2DBFE000
stack
page read and write
3143E000
stack
page read and write
4417F000
stack
page read and write
3727F000
stack
page read and write
45D6B000
unkown
page read and write
5237E000
stack
page read and write
B88F000
stack
page read and write
A50000
heap
page read and write
46A3F000
stack
page read and write
E10000
heap
page read and write
4453F000
stack
page read and write
1F63F000
stack
page read and write
7901F000
stack
page read and write
663E000
stack
page read and write
11B3E000
stack
page read and write
25F7E000
stack
page read and write
BC8E000
stack
page read and write
507FE000
stack
page read and write
47F7F000
stack
page read and write
4837E000
stack
page read and write
D6F000
stack
page read and write
632FE000
stack
page read and write
248FE000
stack
page read and write
1A93F000
stack
page read and write
5B30000
heap
page read and write
5B10000
heap
page read and write
5CA7E000
stack
page read and write
7B8E000
stack
page read and write
DAE000
stack
page read and write
74AFF000
stack
page read and write
8AC0000
heap
page read and write
74F2E000
stack
page read and write
1E13E000
stack
page read and write
69C2E000
stack
page read and write
45D80000
unkown
page read and write
6637F000
stack
page read and write
22BD0980000
heap
page read and write
105FE000
stack
page read and write
1457F000
stack
page read and write
5B67E000
stack
page read and write
2607F000
stack
page read and write
2F4FE000
stack
page read and write
6E50000
heap
page read and write
3563F000
stack
page read and write
5810000
heap
page read and write
B04000
trusted library allocation
page read and write
6C56E000
stack
page read and write
687F000
stack
page read and write
78F1E000
stack
page read and write
1407F000
stack
page read and write
468FF000
stack
page read and write
70F4E000
stack
page read and write
451FE000
stack
page read and write
A45000
heap
page read and write
A52000
heap
page read and write
41D3F000
stack
page read and write
608BF000
stack
page read and write
2A1BE000
stack
page read and write
EFCE000
stack
page read and write
73C4F000
stack
page read and write
60D7E000
stack
page read and write
20B7F000
stack
page read and write
1763F000
stack
page read and write
46BBE000
stack
page read and write
5700000
trusted library allocation
page read and write
416D000
stack
page read and write
4C20000
trusted library allocation
page read and write
A66000
heap
page read and write
15FBF000
stack
page read and write
607BE000
stack
page read and write
1818000
trusted library allocation
page read and write
31A3F000
stack
page read and write
650FE000
stack
page read and write
673F000
stack
page read and write
8CD000
trusted library allocation
page execute and read and write
5E7F000
stack
page read and write
750AE000
stack
page read and write
455BE000
stack
page read and write
1D17E000
stack
page read and write
1277F000
stack
page read and write
2A3FF000
stack
page read and write
113BE000
stack
page read and write
46CBF000
stack
page read and write
45AE000
stack
page read and write
51FC000
heap
page read and write
A70F000
stack
page read and write
9100000
trusted library allocation
page execute and read and write
3CC3E000
stack
page read and write
2ECF000
stack
page read and write
1A1FE000
stack
page read and write
885000
heap
page read and write
4C33E000
stack
page read and write
F37E000
stack
page read and write
D90000
heap
page read and write
2A85000
trusted library allocation
page read and write
207FE000
stack
page read and write
5B4FF000
stack
page read and write
6F07F000
stack
page read and write
A2B000
heap
page read and write
5F8BE000
stack
page read and write
3ACFE000
stack
page read and write
35FE000
stack
page read and write
393BF000
stack
page read and write
54FBF000
stack
page read and write
742CE000
stack
page read and write
4083E000
stack
page read and write
1C9BF000
stack
page read and write
3713F000
stack
page read and write
4973F000
stack
page read and write
330BF000
stack
page read and write
456BF000
stack
page read and write
13C3000
heap
page read and write
B24F000
stack
page read and write
256BE000
stack
page read and write
9D0F000
stack
page read and write
1484000
trusted library allocation
page read and write
5140000
heap
page read and write
4A17E000
stack
page read and write
5280000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
2ACBF000
stack
page read and write
55F0000
trusted library allocation
page read and write
2D1FE000
stack
page read and write
1EEBF000
stack
page read and write
6F63E000
stack
page read and write
5B3BF000
stack
page read and write
2620000
heap
page execute and read and write
63F3F000
stack
page read and write
156FF000
stack
page read and write
950000
heap
page read and write
6EDFF000
stack
page read and write
4ED7F000
stack
page read and write
11FFF000
stack
page read and write
948E000
stack
page read and write
7991E000
stack
page read and write
56DBF000
stack
page read and write
7D3DE000
stack
page read and write
1047F000
stack
page read and write
192FE000
stack
page read and write
7F0F000
stack
page read and write
298BF000
stack
page read and write
58C0000
trusted library allocation
page read and write
1097F000
stack
page read and write
122BE000
stack
page read and write
1BC3E000
stack
page read and write
627BE000
stack
page read and write
2F0FF000
stack
page read and write
1F8BF000
stack
page read and write
12B7E000
stack
page read and write
783F000
stack
page read and write
42C0000
unclassified section
page execute and read and write
42C3F000
stack
page read and write
6D7EF000
stack
page read and write
7B95F000
stack
page read and write
1F2BE000
stack
page read and write
7E65F000
stack
page read and write
5830000
trusted library allocation
page execute and read and write
497F000
stack
page read and write
271FF000
stack
page read and write
3A93E000
stack
page read and write
764E000
stack
page read and write
22E7F000
stack
page read and write
4887E000
stack
page read and write
5ED7E000
stack
page read and write
2963F000
stack
page read and write
37DBF000
stack
page read and write
7D39F000
stack
page read and write
92A000
stack
page read and write
1D27F000
stack
page read and write
5640000
trusted library allocation
page execute and read and write
1E9FE000
stack
page read and write
155BF000
stack
page read and write
7694E000
stack
page read and write
673FE000
stack
page read and write
1F8FE000
stack
page read and write
32E7E000
stack
page read and write
AD0000
trusted library allocation
page read and write
4FEE000
stack
page read and write
2813E000
stack
page read and write
363BE000
stack
page read and write
5A30000
heap
page execute and read and write
CF0000
heap
page read and write
651FF000
stack
page read and write
1163E000
stack
page read and write
6EF7E000
stack
page read and write
A62000
heap
page read and write
91CF000
stack
page read and write
4CBBF000
stack
page read and write
3EDFE000
stack
page read and write
2A5F000
stack
page read and write
95A000
heap
page read and write
5A60000
trusted library allocation
page read and write
1E9BF000
stack
page read and write
36C7E000
stack
page read and write
6177E000
stack
page read and write
5D97E000
stack
page read and write
1587E000
stack
page read and write
4E1F000
stack
page read and write
6CF6E000
stack
page read and write
4A9FF000
stack
page read and write
6FCD000
stack
page read and write
8CCF000
stack
page read and write
4E3BE000
stack
page read and write
56C7F000
stack
page read and write
1113E000
stack
page read and write
7B49E000
stack
page read and write
75AE000
stack
page read and write
22ABF000
stack
page read and write
6DE6E000
stack
page read and write
5FAFF000
stack
page read and write
46B7F000
stack
page read and write
6C7EE000
stack
page read and write
39AE000
stack
page read and write
6163E000
stack
page read and write
7531E000
stack
page read and write
206BE000
stack
page read and write
3F2FE000
stack
page read and write
3283E000
stack
page read and write
A50000
heap
page read and write
4DA3000
heap
page read and write
289BF000
stack
page read and write
2773E000
stack
page read and write
11C8000
heap
page read and write
172BE000
stack
page read and write
2797F000
stack
page read and write
2EC7000
heap
page read and write
1500000
heap
page read and write
654BE000
stack
page read and write
C54E000
stack
page read and write
7FE000
stack
page read and write
2FC3F000
stack
page read and write
7C9DE000
stack
page read and write
3F6BE000
stack
page read and write
3BBFE000
stack
page read and write
4927000
trusted library allocation
page read and write
3BA7F000
stack
page read and write
5973E000
stack
page read and write
555FF000
stack
page read and write
28B3E000
stack
page read and write
3903E000
stack
page read and write
E70E000
stack
page read and write
7F17E000
unkown
page read and write
A47000
heap
page read and write
3F87000
trusted library allocation
page read and write
703E000
stack
page read and write
6533F000
stack
page read and write
B50E000
stack
page read and write
6077F000
stack
page read and write
41C3E000
stack
page read and write
2F70000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
5BDFE000
stack
page read and write
7350E000
stack
page read and write
398BF000
stack
page read and write
433BF000
stack
page read and write
124FF000
stack
page read and write
18F3E000
stack
page read and write
21E7E000
stack
page read and write
940000
heap
page read and write
73B4E000
stack
page read and write
7AE5E000
stack
page read and write
8A8E000
stack
page read and write
253FF000
stack
page read and write
5CA3F000
stack
page read and write
5DF7F000
stack
page read and write
45D7D000
unkown
page read and write
3C73E000
stack
page read and write
5423E000
stack
page read and write
5B7BE000
stack
page read and write
533BE000
stack
page read and write
EC0E000
stack
page read and write
1C37F000
stack
page read and write
579B000
stack
page read and write
55C7E000
stack
page read and write
524BE000
stack
page read and write
2A03F000
stack
page read and write
121E000
stack
page read and write
3ECBE000
stack
page read and write
2C7BF000
stack
page read and write
26BBF000
stack
page read and write
6A4EE000
stack
page read and write
9120000
trusted library allocation
page execute and read and write
25BD000
trusted library allocation
page read and write
7FF4F000
stack
page read and write
2D2FF000
stack
page read and write
6353F000
stack
page read and write
381BE000
stack
page read and write
2F4BF000
stack
page read and write
FC7E000
stack
page read and write
5E97F000
stack
page read and write
52ABF000
stack
page read and write
8D0000
trusted library allocation
page read and write
208FF000
stack
page read and write
6C2EE000
stack
page read and write
1A97E000
stack
page read and write
580BE000
stack
page read and write
18EFF000
stack
page read and write
BD9E000
stack
page read and write
4493E000
stack
page read and write
5A9BF000
stack
page read and write
2D83E000
stack
page read and write
6703E000
stack
page read and write
802000
heap
page read and write
5B0E000
stack
page read and write
746E000
stack
page read and write
304FF000
stack
page read and write
6CCAF000
stack
page read and write
13B7F000
stack
page read and write
2273E000
stack
page read and write
79CDE000
stack
page read and write
6DBE000
stack
page read and write
5A13E000
stack
page read and write
B70D000
stack
page read and write
2C53F000
stack
page read and write
A60E000
stack
page read and write
283BE000
stack
page read and write
638FF000
stack
page read and write
6253E000
stack
page read and write
45D9E000
unkown
page read and write
761DF000
stack
page read and write
11D4000
heap
page read and write
6367F000
stack
page read and write
43DBF000
stack
page read and write
11E0000
heap
page read and write
4FC7F000
stack
page read and write
2B3BF000
stack
page read and write
79A1F000
stack
page read and write
6613E000
stack
page read and write
F27E000
stack
page read and write
79A5E000
stack
page read and write
1307E000
stack
page read and write
4FB7E000
stack
page read and write
7A0000
heap
page read and write
B78E000
stack
page read and write
2ED3F000
stack
page read and write
6B02E000
stack
page read and write
15E0000
trusted library allocation
page read and write
56F3000
heap
page read and write
71A8E000
stack
page read and write
280FF000
stack
page read and write
3C33F000
stack
page read and write
4AFE000
stack
page read and write
441BE000
stack
page read and write
5D3F000
stack
page read and write
6E7FE000
stack
page read and write
6727F000
stack
page read and write
7BD5E000
stack
page read and write
3149000
trusted library allocation
page read and write
1392000
trusted library allocation
page read and write
322B000
trusted library allocation
page read and write
BD8F000
stack
page read and write
3CE7F000
stack
page read and write
A24000
heap
page read and write
50CFE000
stack
page read and write
2AE0000
heap
page read and write
599BE000
stack
page read and write
163BE000
stack
page read and write
7F90F000
stack
page read and write
164FE000
stack
page read and write
6C2AF000
stack
page read and write
797DE000
stack
page read and write
7F2FE000
stack
page read and write
5CBBE000
stack
page read and write
62DBF000
stack
page read and write
2DA7F000
stack
page read and write
8EA000
stack
page read and write
7194E000
stack
page read and write
5D7E000
stack
page read and write
5FEBF000
stack
page read and write
37EFF000
stack
page read and write
148D000
trusted library allocation
page execute and read and write
463FF000
stack
page read and write
420FF000
stack
page read and write
7919E000
stack
page read and write
58CFF000
stack
page read and write
4173E000
stack
page read and write
6497E000
stack
page read and write
17DFE000
stack
page read and write
340FF000
stack
page read and write
5793E000
stack
page read and write
890F000
stack
page read and write
C8CF000
stack
page read and write
8E4D000
stack
page read and write
6807E000
stack
page read and write
664BF000
stack
page read and write
7050F000
stack
page read and write
13A3F000
stack
page read and write
402FF000
stack
page read and write
868F000
stack
page read and write
4FCBE000
stack
page read and write
7FE4E000
stack
page read and write
5EBFF000
stack
page read and write
2731000
trusted library allocation
page read and write
4F2BE000
stack
page read and write
3B2FF000
stack
page read and write
1CAFF000
stack
page read and write
7F6CE000
stack
page read and write
6BEEF000
stack
page read and write
2133E000
stack
page read and write
2AB0000
heap
page read and write
5888000
trusted library section
page readonly
1F77F000
stack
page read and write
4B67F000
stack
page read and write
D58E000
stack
page read and write
3C47F000
stack
page read and write
15E2000
heap
page read and write
1EB3E000
stack
page read and write
5910000
heap
page read and write
45DEC000
unkown
page read and write
45D9B000
unkown
page read and write
85D1000
heap
page read and write
F88E000
stack
page read and write
7017E000
stack
page read and write
1DEBE000
stack
page read and write
E5CE000
stack
page read and write
53F7F000
stack
page read and write
49AFF000
stack
page read and write
45DEF000
unkown
page read and write
4E27E000
stack
page read and write
2C57E000
stack
page read and write
1F27F000
stack
page read and write
1803F000
stack
page read and write
581BF000
stack
page read and write
56EFF000
stack
page read and write
68CBF000
stack
page read and write
2147E000
stack
page read and write
4227E000
stack
page read and write
2633E000
stack
page read and write
3853F000
stack
page read and write
10D3F000
stack
page read and write
7234F000
stack
page read and write
4EAFF000
stack
page read and write
1533F000
stack
page read and write
2D57F000
stack
page read and write
59FFE000
stack
page read and write
31CBF000
stack
page read and write
5C43E000
stack
page read and write
7B5DE000
stack
page read and write
3107E000
stack
page read and write
1730000
trusted library allocation
page read and write
2517F000
stack
page read and write
45D8F000
unkown
page read and write
487E000
stack
page read and write
EBCF000
stack
page read and write
2FBD000
stack
page read and write
2C93E000
stack
page read and write
CA0F000
stack
page read and write
3513F000
stack
page read and write
1B23E000
stack
page read and write
72D8E000
stack
page read and write
66FFF000
stack
page read and write
590FE000
stack
page read and write
748BF000
stack
page read and write
5F27E000
stack
page read and write
45D65000
unkown
page read and write
7F58F000
stack
page read and write
1663E000
stack
page read and write
252BF000
stack
page read and write
701BE000
stack
page read and write
1374000
trusted library allocation
page read and write
7710E000
stack
page read and write
565D000
trusted library allocation
page read and write
B208000
trusted library allocation
page read and write
79C9F000
stack
page read and write
537FF000
stack
page read and write
677E000
stack
page read and write
8B0E000
stack
page read and write
5F9FE000
stack
page read and write
2E37E000
stack
page read and write
22BD0C40000
heap
page read and write
30DB000
heap
page read and write
4A3BF000
stack
page read and write
26FBE000
stack
page read and write
3D87F000
stack
page read and write
327FF000
stack
page read and write
674FF000
stack
page read and write
28FFF000
stack
page read and write
91CF000
stack
page read and write
47BFE000
stack
page read and write
2D1F000
stack
page read and write
FC8000
heap
page read and write
14AA000
trusted library allocation
page execute and read and write
8A0E000
stack
page read and write
568FE000
stack
page read and write
2EABF000
stack
page read and write
771F000
stack
page read and write
1320000
heap
page read and write
583F000
stack
page read and write
285FF000
stack
page read and write
51AE000
stack
page read and write
5523F000
stack
page read and write
7310F000
stack
page read and write
69FAF000
stack
page read and write
1443F000
stack
page read and write
4F03E000
stack
page read and write
1E4FE000
stack
page read and write
45D89000
unkown
page read and write
3503E000
stack
page read and write
3817F000
stack
page read and write
5EAFE000
stack
page read and write
D3E000
stack
page read and write
1343E000
stack
page read and write
4D5BF000
stack
page read and write
1497E000
stack
page read and write
5C07E000
stack
page read and write
4CFBE000
stack
page read and write
5651000
trusted library allocation
page read and write
636BE000
stack
page read and write
4097E000
stack
page read and write
5A87F000
stack
page read and write
659BE000
stack
page read and write
A09000
heap
page read and write
740CE000
stack
page read and write
33C3E000
stack
page read and write
3967E000
stack
page read and write
C3C000
stack
page read and write
6267E000
stack
page read and write
170F000
stack
page read and write
2737E000
stack
page read and write
7D11F000
stack
page read and write
31DE000
stack
page read and write
11DBE000
stack
page read and write
11C3F000
stack
page read and write
59DE000
stack
page read and write
7770000
trusted library allocation
page read and write
4783E000
stack
page read and write
68F7E000
stack
page read and write
86CE000
stack
page read and write
E0CE000
stack
page read and write
4183F000
stack
page read and write
535D000
stack
page read and write
495FF000
stack
page read and write
4443E000
stack
page read and write
7750000
trusted library allocation
page execute and read and write
1582000
heap
page read and write
15FD000
trusted library allocation
page execute and read and write
668BE000
stack
page read and write
7CD9E000
stack
page read and write
5F3BE000
stack
page read and write
5BE0000
heap
page read and write
5D57F000
stack
page read and write
14D0000
trusted library allocation
page read and write
4007F000
stack
page read and write
19A7E000
stack
page read and write
A9C000
stack
page read and write
55B0000
heap
page read and write
7B21E000
stack
page read and write
B390000
heap
page read and write
5F5FF000
stack
page read and write
2B03E000
stack
page read and write
85F6000
heap
page read and write
2EC3E000
stack
page read and write
26E3F000
stack
page read and write
31CFE000
stack
page read and write
4533E000
stack
page read and write
73F4F000
stack
page read and write
48BFF000
stack
page read and write
34BE000
stack
page read and write
7274E000
stack
page read and write
2017F000
stack
page read and write
6777F000
stack
page read and write
5923E000
stack
page read and write
54C3E000
stack
page read and write
145BE000
stack
page read and write
22C3E000
stack
page read and write
2FEFE000
stack
page read and write
F56E000
stack
page read and write
3CD3F000
stack
page read and write
27FFE000
stack
page read and write
480FE000
stack
page read and write
4FFE000
stack
page read and write
7AF5F000
stack
page read and write
6D46E000
stack
page read and write
5053F000
stack
page read and write
3927F000
stack
page read and write
19F7E000
stack
page read and write
2283F000
stack
page read and write
1A6BF000
stack
page read and write
4733E000
stack
page read and write
52FFE000
stack
page read and write
2E50000
heap
page read and write
5295000
heap
page read and write
1A57F000
stack
page read and write
5C67F000
stack
page read and write
145E000
stack
page read and write
6EBBE000
stack
page read and write
B60000
trusted library allocation
page read and write
3F8FF000
stack
page read and write
15D0000
trusted library allocation
page read and write
203FF000
stack
page read and write
69BEF000
stack
page read and write
57A0000
heap
page read and write
720CF000
stack
page read and write
161B000
trusted library allocation
page execute and read and write
45D56000
unkown
page read and write
6DBEE000
stack
page read and write
7EDFF000
stack
page read and write
3703E000
stack
page read and write
43A3E000
stack
page read and write
5E9BE000
stack
page read and write
5630000
trusted library allocation
page read and write
738CE000
stack
page read and write
5AC0000
trusted library allocation
page execute and read and write
471000
remote allocation
page execute and read and write
40BBF000
stack
page read and write
42EBF000
stack
page read and write
2237E000
stack
page read and write
36DBE000
stack
page read and write
1617000
trusted library allocation
page execute and read and write
2A3B000
stack
page read and write
7B0000
heap
page read and write
2C3FF000
stack
page read and write
A7ED000
stack
page read and write
18F0000
trusted library allocation
page read and write
22BD0A40000
heap
page read and write
5537F000
stack
page read and write
105BF000
stack
page read and write
471000
remote allocation
page execute and read and write
4E5E000
stack
page read and write
326BF000
stack
page read and write
681BE000
stack
page read and write
373BF000
stack
page read and write
21D3E000
stack
page read and write
2D6BF000
stack
page read and write
E6DE000
stack
page read and write
2193F000
stack
page read and write
7BF9F000
stack
page read and write
704AD000
unkown
page read and write
3279000
heap
page read and write
43CBE000
stack
page read and write
407FF000
stack
page read and write
4F3FE000
stack
page read and write
30F3E000
stack
page read and write
7BBDF000
stack
page read and write
35DF3000
heap
page read and write
660FF000
stack
page read and write
1217E000
stack
page read and write
936F000
stack
page read and write
B7D0000
trusted library allocation
page execute and read and write
3606000
heap
page read and write
16DBE000
stack
page read and write
3FDFF000
stack
page read and write
4D33F000
stack
page read and write
E30F000
stack
page read and write
3D77E000
stack
page read and write
19DFF000
stack
page read and write
5600000
heap
page read and write
7270F000
stack
page read and write
5BF0000
heap
page read and write
6343E000
stack
page read and write
7C61E000
stack
page read and write
1B83F000
stack
page read and write
211BF000
stack
page read and write
5E23E000
stack
page read and write
17EE000
trusted library allocation
page read and write
7248F000
stack
page read and write
6493F000
stack
page read and write
3D13E000
stack
page read and write
49B3E000
stack
page read and write
3DB3E000
stack
page read and write
56B7E000
stack
page read and write
69FEE000
stack
page read and write
4B1BE000
stack
page read and write
2EFFE000
stack
page read and write
A41000
heap
page read and write
3F07E000
stack
page read and write
68BBE000
stack
page read and write
6A62E000
stack
page read and write
7C85F000
stack
page read and write
16EBF000
stack
page read and write
31B7F000
stack
page read and write
5C10000
heap
page read and write
1110000
heap
page read and write
5820000
heap
page read and write
45DAA000
unkown
page read and write
187BE000
stack
page read and write
71BD0000
heap
page read and write
78D9F000
stack
page read and write
52DE000
stack
page read and write
15FFE000
stack
page read and write
3BFBE000
stack
page read and write
382FE000
stack
page read and write
40CFF000
stack
page read and write
6893E000
stack
page read and write
5CF3F000
stack
page read and write
1B5FE000
stack
page read and write
2FDBE000
stack
page read and write
E48E000
stack
page read and write
385FE000
stack
page read and write
58FBE000
stack
page read and write
AD4F000
stack
page read and write
7314E000
stack
page read and write
40FBE000
stack
page read and write
2427F000
stack
page read and write
59D7E000
stack
page read and write
7A55F000
stack
page read and write
39A3E000
stack
page read and write
5767F000
stack
page read and write
C2CE000
stack
page read and write
78E0000
trusted library allocation
page read and write
71BCE000
stack
page read and write
65D7E000
stack
page read and write
325F000
heap
page read and write
247BE000
stack
page read and write
7E15F000
stack
page read and write
267FF000
stack
page read and write
72E8F000
stack
page read and write
1F67E000
stack
page read and write
6227F000
stack
page read and write
3387E000
stack
page read and write
5193F000
stack
page read and write
760DF000
stack
page read and write
11D2000
heap
page read and write
434FF000
stack
page read and write
20CFE000
stack
page read and write
42DBE000
stack
page read and write
6DE2F000
stack
page read and write
50A7E000
stack
page read and write
5E4BE000
stack
page read and write
45DA1000
unkown
page read and write
2877E000
stack
page read and write
6017E000
stack
page read and write
A37000
heap
page read and write
22BD09A0000
heap
page read and write
2DABE000
stack
page read and write
7698E000
stack
page read and write
123FE000
stack
page read and write
54CE000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
D94E000
stack
page read and write
43F3E000
stack
page read and write
559BF000
stack
page read and write
7430E000
stack
page read and write
1EFFF000
stack
page read and write
615FF000
stack
page read and write
A34000
heap
page read and write
8BD000
trusted library allocation
page execute and read and write
399FF000
stack
page read and write
26ABE000
stack
page read and write
15F3000
trusted library allocation
page read and write
711CE000
stack
page read and write
3423F000
stack
page read and write
169FE000
stack
page read and write
6BC6F000
stack
page read and write
713F000
stack
page read and write
623F000
stack
page read and write
E00000
heap
page read and write
450BE000
stack
page read and write
572BF000
stack
page read and write
AB0E000
stack
page read and write
7030F000
stack
page read and write
2723E000
stack
page read and write
5F37F000
stack
page read and write
C04E000
stack
page read and write
3B5BE000
stack
page read and write
365FF000
stack
page read and write
3AAF000
stack
page read and write
471BF000
stack
page read and write
46E000
remote allocation
page execute and read and write
5743E000
stack
page read and write
17F3E000
stack
page read and write
53B8000
heap
page read and write
1E0FF000
stack
page read and write
4EB0000
trusted library allocation
page read and write
F9CE000
stack
page read and write
4C22000
trusted library allocation
page read and write
B64E000
stack
page read and write
7B4F000
stack
page read and write
C7E000
stack
page read and write
5A27E000
stack
page read and write
3F1BE000
stack
page read and write
98D000
heap
page read and write
275FE000
stack
page read and write
4A77F000
stack
page read and write
183BF000
stack
page read and write
55D0000
trusted library allocation
page read and write
4F27F000
stack
page read and write
7E8DF000
stack
page read and write
7DEDF000
stack
page read and write
1ED7F000
stack
page read and write
7DC9E000
stack
page read and write
3A8FF000
stack
page read and write
322E000
heap
page read and write
2C1BE000
stack
page read and write
1943E000
stack
page read and write
47ABE000
stack
page read and write
1DFBF000
unkown
page read and write
4093F000
stack
page read and write
AF0000
trusted library allocation
page read and write
14CF000
stack
page read and write
5B15000
heap
page read and write
483F000
stack
page read and write
5617E000
stack
page read and write
14B2000
trusted library allocation
page read and write
632BF000
stack
page read and write
2503F000
stack
page read and write
40F7F000
stack
page read and write
2F37F000
stack
page read and write
50F3F000
stack
page read and write
2A9C000
stack
page read and write
A53E000
stack
page read and write
3221000
heap
page read and write
7D8DE000
stack
page read and write
30A3E000
stack
page read and write
5283F000
stack
page read and write
99E000
unkown
page read and write
6E67F000
stack
page read and write
12DFE000
stack
page read and write
3F67F000
stack
page read and write
1340000
heap
page read and write
6393E000
stack
page read and write
FD8E000
stack
page read and write
45D6E000
unkown
page read and write
546FF000
stack
page read and write
6BB2F000
stack
page read and write
7955E000
stack
page read and write
7BADE000
stack
page read and write
18D0000
heap
page read and write
1390000
heap
page read and write
3053E000
stack
page read and write
5327E000
stack
page read and write
A47000
heap
page read and write
A35000
heap
page read and write
45D86000
unkown
page read and write
314A000
trusted library allocation
page read and write
7C49F000
stack
page read and write
39B7E000
stack
page read and write
45DE3000
unkown
page read and write
5810000
trusted library allocation
page read and write
141BF000
stack
page read and write
423BE000
stack
page read and write
13DFF000
stack
page read and write
4467F000
stack
page read and write
184FF000
stack
page read and write
1602000
trusted library allocation
page read and write
6C02F000
stack
page read and write
609FF000
stack
page read and write
5A5FF000
stack
page read and write
3212000
heap
page read and write
14A6000
trusted library allocation
page execute and read and write
173FE000
stack
page read and write
7FA8E000
stack
page read and write
220BF000
stack
page read and write
A3F000
heap
page read and write
42EFE000
stack
page read and write
4DD7E000
stack
page read and write
9DE000
unkown
page read and write
9FCE000
stack
page read and write
20A3F000
stack
page read and write
E45E000
stack
page read and write
4107000
trusted library allocation
page read and write
22BD0CF5000
heap
page read and write
2A75000
trusted library allocation
page read and write
401FE000
stack
page read and write
51BFE000
stack
page read and write
416FF000
stack
page read and write
5BEFF000
stack
page read and write
628BF000
stack
page read and write
B9CF000
stack
page read and write
2CCFE000
stack
page read and write
4C57F000
stack
page read and write
57CBF000
stack
page read and write
506BE000
stack
page read and write
58BFE000
stack
page read and write
E3B187F000
stack
page read and write
27E7F000
stack
page read and write
41E7F000
stack
page read and write
4FDFE000
stack
page read and write
45D53000
unkown
page read and write
B06000
trusted library allocation
page read and write
6B8AF000
stack
page read and write
502FE000
stack
page read and write
6DF6F000
stack
page read and write
5A10000
trusted library allocation
page read and write
32DE000
stack
page read and write
5E6FF000
stack
page read and write
69AAF000
stack
page read and write
23EBF000
stack
page read and write
7ABDE000
stack
page read and write
A4F000
heap
page read and write
358FE000
stack
page read and write
3C2E000
stack
page read and write
77B9F000
stack
page read and write
2CF3F000
stack
page read and write
6843E000
stack
page read and write
7B85E000
stack
page read and write
F5CF000
stack
page read and write
525BF000
stack
page read and write
B60D000
stack
page read and write
A81000
heap
page read and write
6CA2F000
stack
page read and write
7DB1F000
stack
page read and write
8AD000
stack
page read and write
3731000
trusted library allocation
page read and write
11EFE000
stack
page read and write
3D2F000
stack
page read and write
4C3E000
stack
page read and write
31BBE000
stack
page read and write
C18E000
stack
page read and write
1328000
heap
page read and write
3627E000
stack
page read and write
3D4FE000
stack
page read and write
36B3E000
stack
page read and write
4CE3F000
stack
page read and write
35D02000
heap
page read and write
71C3A000
heap
page read and write
623FE000
stack
page read and write
2E33F000
stack
page read and write
2297F000
stack
page read and write
1907000
heap
page read and write
6EE3E000
stack
page read and write
5E5BF000
stack
page read and write
7BFDE000
stack
page read and write
1C5FF000
stack
page read and write
1303F000
stack
page read and write
5FFFF000
stack
page read and write
69E6F000
stack
page read and write
3012000
heap
page read and write
3E53E000
stack
page read and write
4059000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
655FE000
stack
page read and write
7220F000
stack
page read and write
6F89F000
stack
page read and write
5DBFE000
stack
page read and write
343BE000
stack
page read and write
559FE000
stack
page read and write
1F3BF000
stack
page read and write
75EDF000
stack
page read and write
6A76E000
stack
page read and write
4C93F000
stack
page read and write
5EBE000
stack
page read and write
2ADFF000
stack
page read and write
3CBFF000
stack
page read and write
4FBF000
stack
page read and write
669BF000
stack
page read and write
DBCE000
stack
page read and write
252FE000
stack
page read and write
31E3E000
stack
page read and write
985000
heap
page read and write
50A3F000
stack
page read and write
960000
heap
page read and write
30C7F000
stack
page read and write
45D95000
unkown
page read and write
6986E000
stack
page read and write
774E000
stack
page read and write
62A3E000
stack
page read and write
64ABE000
stack
page read and write
906000
heap
page read and write
BBA000
stack
page read and write
5D5BE000
stack
page read and write
545BF000
stack
page read and write
5A70000
trusted library allocation
page execute and read and write
1B5BF000
stack
page read and write
77BE000
stack
page read and write
4EC3F000
stack
page read and write
69FE000
stack
page read and write
45DAD000
unkown
page read and write
67B3F000
stack
page read and write
529BE000
stack
page read and write
3777F000
stack
page read and write
5A73F000
stack
page read and write
3ABBE000
stack
page read and write
C28F000
stack
page read and write
7224E000
stack
page read and write
6E6BE000
stack
page read and write
7915F000
stack
page read and write
6B16E000
stack
page read and write
4BB7F000
stack
page read and write
2EE7F000
stack
page read and write
28AFF000
stack
page read and write
20E3E000
stack
page read and write
876F000
stack
page read and write
352BE000
stack
page read and write
6677E000
stack
page read and write
32A7F000
stack
page read and write
7168F000
stack
page read and write
12C7F000
stack
page read and write
750EE000
stack
page read and write
C30000
heap
page read and write
3243000
heap
page read and write
119FE000
stack
page read and write
7040F000
stack
page read and write
265BE000
stack
page read and write
1EDBE000
stack
page read and write
540FE000
stack
page read and write
525E000
stack
page read and write
9074000
heap
page read and write
51D3E000
stack
page read and write
32BBF000
stack
page read and write
45FE000
stack
page read and write
D40000
heap
page read and write
5337F000
stack
page read and write
C40E000
stack
page read and write
623BF000
stack
page read and write
31DFF000
stack
page read and write
6982F000
stack
page read and write
4273F000
stack
page read and write
64CFF000
stack
page read and write
14F000
stack
page read and write
66B3E000
stack
page read and write
595BF000
stack
page read and write
65ABF000
stack
page read and write
188BF000
stack
page read and write
22FFE000
stack
page read and write
4EFFF000
stack
page read and write
64A7F000
stack
page read and write
3227000
heap
page read and write
7A91F000
stack
page read and write
1EC7E000
stack
page read and write
2B2E000
trusted library allocation
page read and write
6003E000
stack
page read and write
71B8F000
stack
page read and write
1FF3E000
stack
page read and write
3556000
trusted library allocation
page read and write
6932F000
stack
page read and write
3AA3F000
stack
page read and write
3153F000
stack
page read and write
13F7E000
stack
page read and write
178E000
stack
page read and write
4547E000
stack
page read and write
14EE000
stack
page read and write
276FF000
stack
page read and write
6A36F000
stack
page read and write
19BBE000
stack
page read and write
3600000
heap
page read and write
1087E000
stack
page read and write
17C7F000
stack
page read and write
37B3F000
stack
page read and write
4137E000
stack
page read and write
18F5000
trusted library allocation
page read and write
7CADF000
stack
page read and write
429FE000
stack
page read and write
AA2E000
stack
page read and write
1235000
heap
page read and write
311BE000
stack
page read and write
67CBE000
stack
page read and write
A49000
heap
page read and write
6A9EE000
stack
page read and write
633FF000
stack
page read and write
1A7FF000
stack
page read and write
54BB000
trusted library allocation
page read and write
6DFEE000
stack
page read and write
4A07000
trusted library allocation
page read and write
6013F000
stack
page read and write
62B3F000
stack
page read and write
5897E000
stack
page read and write
7BC1E000
stack
page read and write
5C53F000
stack
page read and write
E34E000
stack
page read and write
760E000
stack
page read and write
331FF000
stack
page read and write
55B0000
trusted library allocation
page read and write
52D7E000
stack
page read and write
308FE000
stack
page read and write
7D79E000
stack
page read and write
2EFBF000
stack
page read and write
2647E000
stack
page read and write
55A2000
trusted library allocation
page read and write
1317F000
stack
page read and write
591FF000
stack
page read and write
C00000
system
page execute and read and write
5273E000
stack
page read and write
E0D000
stack
page read and write
4A63F000
stack
page read and write
19CFE000
stack
page read and write
133FF000
stack
page read and write
4B7BF000
stack
page read and write
4FF3E000
stack
page read and write
5B77F000
stack
page read and write
2E87E000
stack
page read and write
67DFE000
stack
page read and write
34C7E000
stack
page read and write
3A17F000
stack
page read and write
56E0000
trusted library allocation
page read and write
35FBF000
stack
page read and write
E3C000
stack
page read and write
10FBF000
stack
page read and write
665FF000
stack
page read and write
32E3F000
stack
page read and write
704AF000
unkown
page readonly
2AB7F000
stack
page read and write
733CE000
stack
page read and write
65EBE000
stack
page read and write
74FF000
stack
page read and write
54F4000
trusted library allocation
page read and write
1C27E000
stack
page read and write
5393F000
stack
page read and write
1FC7F000
stack
page read and write
3B6FE000
stack
page read and write
2233F000
stack
page read and write
2F27E000
stack
page read and write
1357E000
stack
page read and write
2007E000
stack
page read and write
38B3E000
stack
page read and write
7C0DF000
stack
page read and write
6D1AF000
stack
page read and write
B4CF000
stack
page read and write
793E000
stack
page read and write
64BFE000
stack
page read and write
8E0000
heap
page read and write
4EEFE000
stack
page read and write
A24000
heap
page read and write
7ACDF000
stack
page read and write
5F23F000
stack
page read and write
1470000
trusted library allocation
page read and write
5515000
trusted library allocation
page read and write
4B03F000
stack
page read and write
1C9FE000
stack
page read and write
1E3BE000
stack
page read and write
2F23F000
stack
page read and write
14BFE000
stack
page read and write
4197F000
stack
page read and write
262FF000
stack
page read and write
3EC7F000
stack
page read and write
7C21F000
stack
page read and write
4AF3E000
stack
page read and write
1767E000
stack
page read and write
13D0000
heap
page read and write
2ACFE000
stack
page read and write
A33000
heap
page read and write
5883E000
stack
page read and write
401D000
stack
page read and write
52C3E000
stack
page read and write
BDCE000
stack
page read and write
23C7E000
stack
page read and write
6A72F000
stack
page read and write
808E000
stack
page read and write
2FEBF000
stack
page read and write
7EFFF000
stack
page read and write
687FE000
stack
page read and write
F74E000
stack
page read and write
6433E000
stack
page read and write
1867E000
stack
page read and write
35CC0000
heap
page read and write
428BE000
stack
page read and write
6BF2E000
stack
page read and write
4C43F000
stack
page read and write
7B6DF000
stack
page read and write
28C3F000
stack
page read and write
1160000
heap
page read and write
8C9000
stack
page read and write
A30000
heap
page read and write
2107F000
stack
page read and write
11D7F000
stack
page read and write
6C52F000
stack
page read and write
150BF000
stack
page read and write
348E000
trusted library allocation
page read and write
394FF000
stack
page read and write
300E000
stack
page read and write
3CABF000
stack
page read and write
A6AC000
stack
page read and write
5214000
heap
page read and write
67F3E000
stack
page read and write
23D7F000
stack
page read and write
63A7E000
stack
page read and write
347F000
stack
page read and write
74D7F000
stack
page read and write
5D7FF000
stack
page read and write
CF4E000
stack
page read and write
15DA000
heap
page read and write
5D6FE000
stack
page read and write
7130E000
stack
page read and write
6F47E000
stack
page read and write
14BB000
trusted library allocation
page execute and read and write
6B2AE000
stack
page read and write
F90000
heap
page read and write
7FB8F000
stack
page read and write
3B6BF000
stack
page read and write
F4CE000
stack
page read and write
7DD9F000
stack
page read and write
6F67E000
stack
page read and write
3FE3E000
stack
page read and write
138D000
trusted library allocation
page execute and read and write
5527E000
stack
page read and write
7AA5F000
stack
page read and write
34C3F000
stack
page read and write
54D1000
trusted library allocation
page read and write
6BDAF000
stack
page read and write
79E1E000
stack
page read and write
3280000
unclassified section
page execute and read and write
646FE000
stack
page read and write
DE0000
heap
page read and write
6F1FE000
stack
page read and write
4F8BF000
stack
page read and write
4E23F000
stack
page read and write
6801000
heap
page read and write
7D15E000
stack
page read and write
8BCE000
stack
page read and write
908F000
stack
page read and write
DCCF000
stack
page read and write
65FBF000
stack
page read and write
2C2BF000
stack
page read and write
72FCF000
stack
page read and write
74CE000
stack
page read and write
2B8FE000
stack
page read and write
628FE000
stack
page read and write
30CF000
stack
page read and write
2873F000
stack
page read and write
B00000
trusted library allocation
page read and write
45DBF000
unkown
page read and write
5EABF000
stack
page read and write
1D3BF000
stack
page read and write
55DBE000
stack
page read and write
2FB3E000
stack
page read and write
11DF000
stack
page read and write
33E7F000
stack
page read and write
543B000
stack
page read and write
7750000
trusted library allocation
page read and write
5A0FF000
stack
page read and write
55A0000
trusted library allocation
page read and write
6F8D000
stack
page read and write
73FE000
stack
page read and write
604FF000
stack
page read and write
7CCE000
stack
page read and write
631BE000
stack
page read and write
45DC2000
unkown
page read and write
1607000
heap
page read and write
3167F000
stack
page read and write
1547F000
stack
page read and write
202FE000
stack
page read and write
7578F000
stack
page read and write
5007E000
stack
page read and write
5613F000
stack
page read and write
49C7E000
stack
page read and write
45D62000
unkown
page read and write
2467E000
stack
page read and write
5720000
trusted library allocation
page read and write
2747F000
stack
page read and write
683FF000
stack
page read and write
182BE000
stack
page read and write
36AFF000
stack
page read and write
8F43000
heap
page read and write
3FBBE000
stack
page read and write
1BFBF000
stack
page read and write
5FDBE000
stack
page read and write
393E000
stack
page read and write
4E4FE000
stack
page read and write
6857E000
stack
page read and write
502BF000
stack
page read and write
5857F000
stack
page read and write
7B35E000
stack
page read and write
16C3F000
stack
page read and write
3D23F000
stack
page read and write
6A22F000
stack
page read and write
426E000
stack
page read and write
EF8F000
stack
page read and write
7B59F000
stack
page read and write
3BE3F000
stack
page read and write
6583F000
stack
page read and write
533FE000
stack
page read and write
37F3E000
stack
page read and write
48A7000
trusted library allocation
page read and write
17CB000
stack
page read and write
4E000
stack
page read and write
5A90000
heap
page read and write
1727F000
stack
page read and write
14F7F000
stack
page read and write
373FE000
stack
page read and write
647FF000
stack
page read and write
1C4FE000
stack
page read and write
3D27E000
stack
page read and write
6547F000
stack
page read and write
1D53E000
stack
page read and write
12CBE000
stack
page read and write
177BE000
stack
page read and write
1C4BF000
stack
page read and write
30E5000
trusted library allocation
page read and write
3C4BE000
stack
page read and write
64BF000
stack
page read and write
46E000
remote allocation
page execute and read and write
147FF000
stack
page read and write
3225000
heap
page read and write
32FBE000
stack
page read and write
2BF3E000
stack
page read and write
9DF000
unkown
page read and write
22FBF000
stack
page read and write
45D83000
unkown
page read and write
E49E000
stack
page read and write
7F68F000
stack
page read and write
5800000
trusted library section
page readonly
A32000
heap
page read and write
B28E000
stack
page read and write
34FFF000
stack
page read and write
4B7FE000
stack
page read and write
704AF000
unkown
page readonly
DDE000
stack
page read and write
266FE000
stack
page read and write
734CF000
stack
page read and write
B6CE000
stack
page read and write
257BF000
stack
page read and write
2863E000
stack
page read and write
7969E000
stack
page read and write
C50F000
stack
page read and write
60FFE000
stack
page read and write
6D56F000
stack
page read and write
132FE000
stack
page read and write
44E3E000
stack
page read and write
679000
stack
page read and write
1447E000
stack
page read and write
448FF000
stack
page read and write
F23C000
stack
page read and write
1EC3F000
stack
page read and write
6263F000
stack
page read and write
6627E000
stack
page read and write
54FFE000
stack
page read and write
45DE0000
unkown
page read and write
1A0BE000
stack
page read and write
4743F000
stack
page read and write
587E000
stack
page read and write
F80000
heap
page read and write
1FDBF000
stack
page read and write
1FA3E000
stack
page read and write
66EBF000
stack
page read and write
9110000
trusted library allocation
page read and write
15C3E000
stack
page read and write
132BF000
stack
page read and write
A1E000
heap
page read and write
A23000
heap
page read and write
15E3000
trusted library allocation
page execute and read and write
50FF000
stack
page read and write
5632000
trusted library allocation
page read and write
F83B000
stack
page read and write
9B0000
heap
page read and write
490FF000
stack
page read and write
7690E000
stack
page read and write
587B000
stack
page read and write
4C83E000
stack
page read and write
438FE000
stack
page read and write
4C60000
trusted library allocation
page read and write
A21000
heap
page read and write
576BE000
stack
page read and write
160FF000
stack
page read and write
6B3EE000
stack
page read and write
D92000
unkown
page readonly
110FF000
stack
page read and write
A10E000
stack
page read and write
4147F000
stack
page read and write
750E000
stack
page read and write
5057E000
stack
page read and write
45D4D000
unkown
page read and write
1FB3F000
stack
page read and write
25DFF000
stack
page read and write
7929F000
stack
page read and write
3157E000
stack
page read and write
758CE000
stack
page read and write
229BE000
stack
page read and write
4833F000
stack
page read and write
75FDF000
stack
page read and write
2643F000
stack
page read and write
4FEFF000
stack
page read and write
58D3E000
stack
page read and write
3006000
heap
page read and write
51FBE000
stack
page read and write
67A3E000
stack
page read and write
788DE000
stack
page read and write
304D000
stack
page read and write
378FE000
stack
page read and write
5577E000
stack
page read and write
41D7E000
stack
page read and write
BBED000
stack
page read and write
29C7F000
stack
page read and write
472FF000
stack
page read and write
4847F000
stack
page read and write
9E0000
heap
page read and write
5987E000
stack
page read and write
197BF000
stack
page read and write
47E7E000
stack
page read and write
3977F000
stack
page read and write
13FD000
heap
page read and write
A40E000
stack
page read and write
3B57F000
stack
page read and write
2E4BE000
stack
page read and write
5BF3E000
stack
page read and write
7DC5F000
stack
page read and write
6213F000
stack
page read and write
5F63E000
stack
page read and write
59ABF000
stack
page read and write
4FA3E000
stack
page read and write
383FF000
stack
page read and write
4237F000
stack
page read and write
45D92000
unkown
page read and write
45DA4000
unkown
page read and write
33BFF000
stack
page read and write
45DCE000
unkown
page read and write
224BE000
stack
page read and write
637FE000
stack
page read and write
348BE000
stack
page read and write
7E3DF000
stack
page read and write
40D9000
trusted library allocation
page read and write
762DF000
stack
page read and write
261BF000
stack
page read and write
3077F000
stack
page read and write
CF0F000
stack
page read and write
6053E000
stack
page read and write
406FE000
stack
page read and write
D7F000
stack
page read and write
293BF000
stack
page read and write
3C0FE000
stack
page read and write
1AF7F000
stack
page read and write
8FF0000
heap
page read and write
3017E000
stack
page read and write
4EB3E000
stack
page read and write
4A4FF000
stack
page read and write
52E7F000
stack
page read and write
26D3E000
stack
page read and write
4C10000
heap
page read and write
498BE000
stack
page read and write
62DFE000
stack
page read and write
4897F000
stack
page read and write
1353F000
stack
page read and write
45ABE000
stack
page read and write
4E37E000
stack
page read and write
3B83E000
stack
page read and write
5A4FE000
stack
page read and write
7013F000
stack
page read and write
571BE000
stack
page read and write
20F7E000
stack
page read and write
4EA0000
trusted library allocation
page read and write
51C2000
heap
page read and write
3101000
heap
page read and write
32CFF000
stack
page read and write
F3BD000
stack
page read and write
60D3F000
stack
page read and write
7932000
trusted library allocation
page read and write
521C000
heap
page read and write
6D96E000
stack
page read and write
3C37E000
stack
page read and write
5ADBE000
stack
page read and write
50BBE000
stack
page read and write
258FF000
stack
page read and write
2403E000
stack
page read and write
5677F000
stack
page read and write
18C7F000
stack
page read and write
A1F000
heap
page read and write
6803F000
stack
page read and write
F20F000
stack
page read and write
573E000
stack
page read and write
345E000
stack
page read and write
15CA000
heap
page read and write
619FE000
stack
page read and write
1C8BE000
stack
page read and write
A41000
heap
page read and write
7F2BE000
stack
page read and write
48D3F000
stack
page read and write
D0E000
stack
page read and write
5A4BF000
stack
page read and write
11E5000
heap
page read and write
55D0000
trusted library allocation
page read and write
2AA7E000
stack
page read and write
1245000
heap
page read and write
14A0000
trusted library allocation
page read and write
6CBAE000
stack
page read and write
7D25F000
stack
page read and write
A3A000
heap
page read and write
4E4BF000
stack
page read and write
1B6FF000
stack
page read and write
10E7F000
stack
page read and write
5830000
trusted library allocation
page read and write
7E79F000
stack
page read and write
27EBE000
stack
page read and write
14FBE000
stack
page read and write
6D40000
trusted library allocation
page read and write
A20F000
stack
page read and write
60E7F000
stack
page read and write
2417E000
stack
page read and write
78B1F000
stack
page read and write
18C0000
heap
page execute and read and write
7535E000
stack
page read and write
63CFE000
stack
page read and write
5487E000
stack
page read and write
5A77E000
stack
page read and write
7A59E000
stack
page read and write
317BF000
stack
page read and write
25B7F000
stack
page read and write
51CFF000
stack
page read and write
1360000
trusted library allocation
page read and write
5933F000
stack
page read and write
567BE000
stack
page read and write
42AFF000
stack
page read and write
A98F000
stack
page read and write
11A0000
heap
page read and write
293FE000
stack
page read and write
5520000
trusted library allocation
page read and write
1993E000
stack
page read and write
5880000
trusted library section
page readonly
38C7E000
stack
page read and write
9A8F000
stack
page read and write
4D23E000
stack
page read and write
1AABE000
stack
page read and write
115E000
stack
page read and write
29F3E000
stack
page read and write
25A3F000
stack
page read and write
3DEFE000
stack
page read and write
45D47000
unkown
page read and write
663BE000
stack
page read and write
2A6BE000
stack
page read and write
516FE000
stack
page read and write
3917E000
stack
page read and write
467FE000
stack
page read and write
2A40000
heap
page read and write
789DF000
stack
page read and write
4EDBE000
stack
page read and write
2E9BE000
stack
page read and write
71A4F000
stack
page read and write
747BF000
stack
page read and write
42FFF000
stack
page read and write
562BE000
stack
page read and write
773C000
stack
page read and write
6C42E000
stack
page read and write
1033F000
stack
page read and write
5EFBF000
stack
page read and write
302BE000
stack
page read and write
3A53F000
stack
page read and write
494BF000
stack
page read and write
7B31F000
stack
page read and write
4BFF000
stack
page read and write
1080000
heap
page read and write
5C8FF000
stack
page read and write
29A3E000
stack
page read and write
4D4BE000
stack
page read and write
5940000
trusted library section
page readonly
2BCBE000
stack
page read and write
1710000
trusted library allocation
page read and write
1820000
heap
page read and write
54BFF000
stack
page read and write
317FE000
stack
page read and write
6A10000
heap
page read and write
3BABE000
stack
page read and write
717CF000
stack
page read and write
4133F000
stack
page read and write
9E8E000
stack
page read and write
210BE000
stack
page read and write
5950000
heap
page read and write
DE0000
heap
page read and write
ED3D000
stack
page read and write
4BDD000
stack
page read and write
275BF000
stack
page read and write
30D0000
heap
page read and write
5147E000
stack
page read and write
485FE000
stack
page read and write
54D6000
trusted library allocation
page read and write
4313F000
stack
page read and write
4BA7E000
stack
page read and write
695AF000
stack
page read and write
1CFFF000
stack
page read and write
499FE000
stack
page read and write
CE0E000
stack
page read and write
357BE000
stack
page read and write
1FEFF000
stack
page read and write
84D000
stack
page read and write
741CF000
stack
page read and write
2BB3F000
stack
page read and write
940000
heap
page read and write
4883F000
stack
page read and write
64BBF000
stack
page read and write
511B000
stack
page read and write
3857E000
stack
page read and write
541B000
stack
page read and write
2F13E000
stack
page read and write
7108E000
stack
page read and write
2B07000
heap
page read and write
41AFE000
stack
page read and write
3EDBF000
stack
page read and write
2A67F000
stack
page read and write
438BF000
stack
page read and write
7765E000
stack
page read and write
2C8FF000
stack
page read and write
8B3000
trusted library allocation
page execute and read and write
257FE000
stack
page read and write
B7D000
stack
page read and write
5893F000
stack
page read and write
61EBF000
stack
page read and write
3A43E000
stack
page read and write
55EBF000
stack
page read and write
37C7F000
stack
page read and write
4BCFE000
stack
page read and write
4C80000
trusted library allocation
page execute and read and write
1BE7F000
stack
page read and write
52DE000
stack
page read and write
3687F000
stack
page read and write
4EEBF000
stack
page read and write
A5CF000
stack
page read and write
22BD0CF0000
heap
page read and write
1FCBE000
stack
page read and write
288BE000
stack
page read and write
70E0E000
stack
page read and write
78AE000
stack
page read and write
197FE000
stack
page read and write
45DFB000
unkown
page read and write
6AFF000
stack
page read and write
486FF000
stack
page read and write
8AF2000
heap
page read and write
50DE000
stack
page read and write
CEE000
system
page execute and read and write
2B17E000
stack
page read and write
261FE000
stack
page read and write
F6FE000
stack
page read and write
2553F000
stack
page read and write
15E7F000
stack
page read and write
1203E000
stack
page read and write
68E3E000
stack
page read and write
2683E000
stack
page read and write
1A83E000
stack
page read and write
1DC3E000
stack
page read and write
5920000
heap
page read and write
3E3FE000
stack
page read and write
2827E000
stack
page read and write
3413E000
stack
page read and write
83F000
stack
page read and write
32D3E000
stack
page read and write
A37000
heap
page read and write
439FF000
stack
page read and write
4DAFE000
stack
page read and write
284BF000
stack
page read and write
7D65E000
stack
page read and write
6767E000
stack
page read and write
8A4F000
stack
page read and write
42C7E000
stack
page read and write
2F9BF000
stack
page read and write
28F000
stack
page read and write
25E3E000
stack
page read and write
93E000
unkown
page read and write
763DF000
stack
page read and write
10DF000
stack
page read and write
22AFE000
stack
page read and write
59BE000
stack
page read and write
7FD0E000
stack
page read and write
22BD0970000
heap
page read and write
2DD3E000
stack
page read and write
5F13E000
stack
page read and write
F60000
heap
page read and write
5223E000
stack
page read and write
950000
heap
page read and write
4557F000
stack
page read and write
55AFF000
stack
page read and write
13BBE000
stack
page read and write
1BFFE000
stack
page read and write
470BE000
stack
page read and write
3323E000
stack
page read and write
AB7000
trusted library allocation
page execute and read and write
1356000
heap
page read and write
7D4DF000
stack
page read and write
57FC000
stack
page read and write
C64F000
stack
page read and write
25CFE000
stack
page read and write
63BBE000
stack
page read and write
14E0000
trusted library allocation
page execute and read and write
7B99E000
stack
page read and write
297BE000
stack
page read and write
72C0F000
stack
page read and write
68CFE000
stack
page read and write
7B45F000
stack
page read and write
17F6000
trusted library allocation
page read and write
480BF000
stack
page read and write
216FE000
stack
page read and write
527E000
stack
page read and write
6AB2E000
stack
page read and write
1483000
trusted library allocation
page execute and read and write
4A13F000
stack
page read and write
641FE000
stack
page read and write
3397F000
stack
page read and write
173BF000
stack
page read and write
7C99F000
stack
page read and write
136BE000
stack
page read and write
B5CD000
stack
page read and write
4F60000
heap
page execute and read and write
364FE000
stack
page read and write
3677E000
stack
page read and write
737000
stack
page read and write
13A2000
trusted library allocation
page read and write
13AB000
trusted library allocation
page execute and read and write
1AA7F000
stack
page read and write
B5E000
stack
page read and write
3293F000
stack
page read and write
A34F000
stack
page read and write
21BFE000
stack
page read and write
3333F000
stack
page read and write
2D5BE000
stack
page read and write
70F0F000
stack
page read and write
10FFE000
stack
page read and write
6717E000
stack
page read and write
5F0FF000
stack
page read and write
27AFE000
stack
page read and write
E20E000
stack
page read and write
519E000
stack
page read and write
5003F000
stack
page read and write
23DBE000
stack
page read and write
6623F000
stack
page read and write
3577F000
stack
page read and write
1123F000
stack
page read and write
BB4E000
stack
page read and write
6A3AE000
stack
page read and write
2CBBE000
stack
page read and write
A43000
heap
page read and write
154BE000
stack
page read and write
56CBE000
stack
page read and write
67EFF000
stack
page read and write
90F0000
trusted library allocation
page read and write
E31D000
stack
page read and write
7E69E000
stack
page read and write
85B2000
heap
page read and write
40BFE000
stack
page read and write
BAAD000
stack
page read and write
2593E000
stack
page read and write
3DDBE000
stack
page read and write
1059000
stack
page read and write
7A7DF000
stack
page read and write
3EB3F000
stack
page read and write
4DBFF000
stack
page read and write
549BE000
stack
page read and write
4B2BF000
stack
page read and write
335BF000
stack
page read and write
432BE000
stack
page read and write
7170000
heap
page read and write
3767E000
stack
page read and write
4B3FF000
stack
page read and write
517FF000
stack
page read and write
1BAFE000
stack
page read and write
1573E000
stack
page read and write
52BFF000
stack
page read and write
708C000
stack
page read and write
5CCBF000
stack
page read and write
1A5BE000
stack
page read and write
57E3E000
stack
page read and write
7740000
trusted library allocation
page read and write
8AC8000
heap
page read and write
31AE000
stack
page read and write
7388F000
stack
page read and write
1A43F000
stack
page read and write
14ABE000
stack
page read and write
7310000
heap
page read and write
11EBF000
stack
page read and write
A2CD000
stack
page read and write
1B1FF000
stack
page read and write
5F9BF000
stack
page read and write
56D0000
heap
page read and write
563B000
trusted library allocation
page read and write
6DCEF000
stack
page read and write
699AE000
stack
page read and write
451BF000
stack
page read and write
7F330000
trusted library allocation
page execute and read and write
7839F000
stack
page read and write
5627F000
stack
page read and write
292BE000
stack
page read and write
61DBE000
stack
page read and write
980F000
stack
page read and write
53AE000
stack
page read and write
3E17E000
stack
page read and write
266BF000
stack
page read and write
2CCBF000
stack
page read and write
4F7BE000
stack
page read and write
D30E000
stack
page read and write
77A9F000
stack
page read and write
193FF000
stack
page read and write
4667F000
unkown
page read and write
4747E000
stack
page read and write
321BF000
stack
page read and write
BC4F000
stack
page read and write
7889F000
stack
page read and write
4BDFF000
stack
page read and write
31F3F000
stack
page read and write
1C87F000
stack
page read and write
550FF000
stack
page read and write
D20000
heap
page read and write
475BE000
stack
page read and write
520BF000
stack
page read and write
4F17E000
stack
page read and write
EA8F000
stack
page read and write
E30000
heap
page read and write
47BBF000
stack
page read and write
23FFF000
stack
page read and write
1F3FE000
stack
page read and write
5FD000
stack
page read and write
3ADFF000
stack
page read and write
1DFFE000
stack
page read and write
45DD1000
unkown
page read and write
476BF000
stack
page read and write
7FE0F000
stack
page read and write
31A7E000
stack
page read and write
508FF000
stack
page read and write
46E000
remote allocation
page execute and read and write
2E5FE000
stack
page read and write
3AE3E000
stack
page read and write
3D63E000
stack
page read and write
11BF000
stack
page read and write
7A95E000
stack
page read and write
13A7000
trusted library allocation
page execute and read and write
1610000
trusted library allocation
page read and write
512FF000
stack
page read and write
EE4F000
stack
page read and write
57F3F000
stack
page read and write
6EBF000
stack
page read and write
793DF000
stack
page read and write
AACF000
stack
page read and write
1AE7E000
stack
page read and write
5ED3F000
stack
page read and write
3D9FE000
stack
page read and write
34B3E000
stack
page read and write
3B97E000
stack
page read and write
1390000
trusted library allocation
page read and write
5F4BF000
stack
page read and write
4EC0000
trusted library allocation
page execute and read and write
696EF000
stack
page read and write
6F1BF000
stack
page read and write
729CE000
stack
page read and write
880000
heap
page read and write
23AFF000
stack
page read and write
6A0EF000
stack
page read and write
35B7E000
stack
page read and write
31F7E000
stack
page read and write
DF8E000
stack
page read and write
7B0000
heap
page read and write
1253E000
stack
page read and write
DBB000
stack
page read and write
5717F000
stack
page read and write
59D3F000
stack
page read and write
DB8F000
stack
page read and write
2E0FE000
stack
page read and write
59FBF000
stack
page read and write
5B63F000
stack
page read and write
106FF000
stack
page read and write
12F7000
stack
page read and write
8C0000
trusted library allocation
page read and write
33FBF000
stack
page read and write
4E77E000
stack
page read and write
6597F000
stack
page read and write
39B3F000
stack
page read and write
1E87F000
stack
page read and write
5F4FE000
stack
page read and write
7DA1E000
stack
page read and write
2657F000
stack
page read and write
14E7E000
stack
page read and write
4DABF000
stack
page read and write
35DA8000
heap
page read and write
3612000
heap
page read and write
7A81E000
stack
page read and write
5A80000
heap
page read and write
C02000
system
page execute and read and write
5F87F000
stack
page read and write
72C4E000
stack
page read and write
1B0BF000
stack
page read and write
34EBF000
stack
page read and write
5CCFE000
stack
page read and write
35CBE000
stack
page read and write
A34000
heap
page read and write
251BE000
stack
page read and write
39CBE000
stack
page read and write
49EBF000
stack
page read and write
5C17F000
stack
page read and write
7F7CF000
stack
page read and write
64E7E000
stack
page read and write
1703E000
stack
page read and write
1E77E000
stack
page read and write
336FF000
stack
page read and write
44CFE000
stack
page read and write
2B3FE000
stack
page read and write
48E7F000
stack
page read and write
4A7BE000
stack
page read and write
127BE000
stack
page read and write
8FE000
unkown
page read and write
353BF000
stack
page read and write
1EAFF000
stack
page read and write
3673F000
stack
page read and write
5350000
trusted library allocation
page read and write
2B9FF000
stack
page read and write
123BF000
stack
page read and write
54BE000
stack
page read and write
DF0000
heap
page read and write
3527F000
stack
page read and write
2745000
trusted library allocation
page read and write
38C3F000
stack
page read and write
3150000
heap
page read and write
33D3F000
stack
page read and write
158D000
heap
page read and write
52FBF000
stack
page read and write
1110000
heap
page read and write
5C7FE000
stack
page read and write
5C93E000
stack
page read and write
4CA0000
heap
page read and write
429BF000
stack
page read and write
2F2E000
stack
page read and write
D90000
unkown
page readonly
29B7E000
stack
page read and write
4317E000
stack
page read and write
F1A000
stack
page read and write
52EBE000
stack
page read and write
188FE000
stack
page read and write
54D3F000
stack
page read and write
2413F000
stack
page read and write
25B1000
trusted library allocation
page read and write
49DBE000
stack
page read and write
374FF000
stack
page read and write
169BF000
stack
page read and write
6D92F000
stack
page read and write
7E19E000
stack
page read and write
15D7E000
stack
page read and write
7C25E000
stack
page read and write
6BDEE000
stack
page read and write
5000000
trusted library allocation
page read and write
45D44000
unkown
page read and write
D18F000
stack
page read and write
4707F000
stack
page read and write
37DC000
stack
page read and write
1187F000
stack
page read and write
4797E000
stack
page read and write
4F9FF000
stack
page read and write
30DBF000
stack
page read and write
3E63F000
stack
page read and write
87CF000
stack
page read and write
202BF000
stack
page read and write
49D7F000
stack
page read and write
804F000
stack
page read and write
1606000
trusted library allocation
page execute and read and write
7F840000
trusted library allocation
page execute and read and write
3067E000
stack
page read and write
B14E000
stack
page read and write
7104F000
stack
page read and write
DF4F000
stack
page read and write
3E27F000
stack
page read and write
16D7F000
stack
page read and write
484BE000
stack
page read and write
7ECFF000
stack
page read and write
E5DD000
stack
page read and write
3B33E000
stack
page read and write
563FE000
stack
page read and write
85C7000
heap
page read and write
2E5BF000
stack
page read and write
3953E000
stack
page read and write
1373000
trusted library allocation
page execute and read and write
97D000
heap
page read and write
1493F000
stack
page read and write
7C4DE000
stack
page read and write
CC8F000
stack
page read and write
35BA000
trusted library allocation
page read and write
4DA0000
heap
page read and write
60EBE000
stack
page read and write
A92E000
stack
page read and write
67C7F000
stack
page read and write
4BF7E000
stack
page read and write
2A07E000
stack
page read and write
133C000
stack
page read and write
F38E000
stack
page read and write
1DBFF000
stack
page read and write
4ACBE000
stack
page read and write
119BF000
stack
page read and write
3FA3F000
stack
page read and write
3040000
heap
page execute and read and write
AFCF000
stack
page read and write
2FAE000
unkown
page read and write
6C1AE000
stack
page read and write
5843F000
stack
page read and write
A25000
heap
page read and write
1D63F000
unkown
page read and write
4ED0000
heap
page read and write
4C7FF000
stack
page read and write
2F5F000
stack
page read and write
325BE000
stack
page read and write
3D5FF000
stack
page read and write
2C07E000
stack
page read and write
9E0000
heap
page read and write
C7CE000
stack
page read and write
499BF000
stack
page read and write
686BE000
stack
page read and write
572FE000
stack
page read and write
424FE000
stack
page read and write
4D47F000
stack
page read and write
3767000
trusted library allocation
page read and write
1E37F000
stack
page read and write
349BF000
stack
page read and write
31C9000
trusted library allocation
page read and write
170E000
stack
page read and write
573FF000
stack
page read and write
8EE000
heap
page read and write
452FF000
stack
page read and write
48ABF000
stack
page read and write
3DEBF000
stack
page read and write
27AD000
trusted library allocation
page read and write
27FBF000
stack
page read and write
7270000
trusted library allocation
page execute and read and write
3177000
heap
page read and write
731E000
heap
page read and write
1612000
trusted library allocation
page read and write
3E3BF000
stack
page read and write
5663F000
stack
page read and write
225BF000
stack
page read and write
53FBE000
stack
page read and write
8ED000
stack
page read and write
393FE000
stack
page read and write
44A7E000
stack
page read and write
74EEF000
stack
page read and write
1170000
heap
page read and write
62EFF000
stack
page read and write
8B3C000
heap
page read and write
6C7AF000
stack
page read and write
226FF000
stack
page read and write
1205000
heap
page read and write
563BF000
stack
page read and write
7E7DE000
stack
page read and write
47A7F000
stack
page read and write
A0CF000
stack
page read and write
6AC6E000
stack
page read and write
32ABE000
stack
page read and write
39EFF000
stack
page read and write
234FE000
stack
page read and write
24DBF000
stack
page read and write
45DE6000
unkown
page read and write
7B71E000
stack
page read and write
4B53F000
stack
page read and write
1720000
trusted library allocation
page read and write
4FDE000
stack
page read and write
27D7E000
stack
page read and write
26A7F000
stack
page read and write
6763F000
stack
page read and write
2DCFF000
stack
page read and write
5A23F000
stack
page read and write
5447F000
stack
page read and write
515BE000
stack
page read and write
5656000
trusted library allocation
page read and write
13C0000
heap
page read and write
2CF7E000
stack
page read and write
7D9DF000
stack
page read and write
12A3E000
stack
page read and write
1623F000
stack
page read and write
4277E000
stack
page read and write
7D61F000
stack
page read and write
1827000
heap
page read and write
2B4FF000
stack
page read and write
4E0FF000
stack
page read and write
998E000
stack
page read and write
A00000
heap
page read and write
155FE000
stack
page read and write
5A37F000
stack
page read and write
7AD1E000
stack
page read and write
855000
heap
page read and write
E80F000
stack
page read and write
40F0000
trusted library allocation
page read and write
18A3E000
stack
page read and write
5233F000
stack
page read and write
2F2E000
stack
page read and write
35C7F000
stack
page read and write
230FF000
stack
page read and write
27D3F000
stack
page read and write
10D0000
heap
page read and write
520FE000
stack
page read and write
354FF000
stack
page read and write
D54F000
stack
page read and write
8EB000
heap
page read and write
4738000
trusted library allocation
page read and write
14E3F000
stack
page read and write
65BFF000
stack
page read and write
3E67E000
stack
page read and write
6B4EF000
stack
page read and write
15ABF000
stack
page read and write
74C7E000
stack
page read and write
235FF000
stack
page read and write
45BBF000
stack
page read and write
3003E000
stack
page read and write
6B12F000
stack
page read and write
37CBE000
stack
page read and write
586FE000
stack
page read and write
6317F000
stack
page read and write
7AA9E000
stack
page read and write
4C0BE000
stack
page read and write
1483E000
stack
page read and write
554BF000
stack
page read and write
4DFFE000
stack
page read and write
45D77000
unkown
page read and write
14A0000
trusted library allocation
page read and write
63BE000
stack
page read and write
E9BE000
stack
page read and write
40E3F000
stack
page read and write
5B53E000
stack
page read and write
A25000
heap
page read and write
1157000
stack
page read and write
4C2FF000
stack
page read and write
4C90000
trusted library section
page readonly
44A3F000
stack
page read and write
A3E000
heap
page read and write
4403F000
stack
page read and write
5620000
heap
page read and write
909000
stack
page read and write
58F7F000
stack
page read and write
FD4F000
stack
page read and write
3AEE000
stack
page read and write
7238E000
stack
page read and write
25CBF000
stack
page read and write
4E5FF000
stack
page read and write
83A000
stack
page read and write
5AEFE000
stack
page read and write
78DDE000
stack
page read and write
77DA0000
heap
page read and write
3CF000
stack
page read and write
7140F000
stack
page read and write
7FCCF000
stack
page read and write
15CF000
stack
page read and write
359FF000
stack
page read and write
78A1E000
stack
page read and write
E84E000
stack
page read and write
3739000
trusted library allocation
page read and write
3266000
heap
page read and write
70DCF000
stack
page read and write
1F53E000
stack
page read and write
5985000
heap
page read and write
5B13F000
stack
page read and write
279BE000
stack
page read and write
4C5BE000
stack
page read and write
6CDEF000
stack
page read and write
5653E000
stack
page read and write
59AFE000
stack
page read and write
4FDBF000
stack
page read and write
18E000
stack
page read and write
6C7E000
stack
page read and write
78D0000
trusted library allocation
page read and write
473E000
stack
page read and write
3AF3F000
stack
page read and write
58D0000
trusted library allocation
page execute and read and write
3200000
heap
page read and write
64FE000
stack
page read and write
4CE7E000
stack
page read and write
679FF000
stack
page read and write
54ABF000
stack
page read and write
2F9FE000
stack
page read and write
3FF3F000
stack
page read and write
5D33E000
stack
page read and write
41FFE000
stack
page read and write
7A05F000
stack
page read and write
A63E000
stack
page read and write
6853F000
stack
page read and write
A2E000
heap
page read and write
2F73F000
stack
page read and write
6C66F000
stack
page read and write
66C3F000
stack
page read and write
655BF000
stack
page read and write
5FFE000
stack
page read and write
6A26E000
stack
page read and write
18080000
heap
page read and write
52AFE000
stack
page read and write
3963F000
stack
page read and write
7769000
trusted library allocation
page read and write
5847E000
stack
page read and write
7338F000
stack
page read and write
45DBC000
unkown
page read and write
45D74000
unkown
page read and write
233BE000
stack
page read and write
6D32E000
stack
page read and write
7502F000
stack
page read and write
3FCFE000
stack
page read and write
2977F000
stack
page read and write
4CB000
stack
page read and write
67B7E000
stack
page read and write
D7CF000
stack
page read and write
3257F000
stack
page read and write
1F7BE000
stack
page read and write
5490000
trusted library allocation
page execute and read and write
419BE000
stack
page read and write
3BF7F000
stack
page read and write
353FE000
stack
page read and write
3C23E000
stack
page read and write
4327F000
stack
page read and write
554FE000
stack
page read and write
1C13E000
stack
page read and write
1E4BF000
stack
page read and write
364BF000
stack
page read and write
B70000
heap
page read and write
74B3E000
stack
page read and write
6753E000
stack
page read and write
5397E000
stack
page read and write
24F3E000
stack
page read and write
695EE000
stack
page read and write
3D73F000
stack
page read and write
840F000
stack
page read and write
27BFF000
stack
page read and write
55E0000
heap
page execute and read and write
5BA3E000
stack
page read and write
25F3F000
stack
page read and write
3103F000
stack
page read and write
63DFF000
stack
page read and write
2067F000
stack
page read and write
2F8BE000
stack
page read and write
1A6FE000
stack
page read and write
614BF000
unkown
page read and write
30CBE000
stack
page read and write
57CFE000
stack
page read and write
2C67F000
stack
page read and write
3C87E000
stack
page read and write
5DE3F000
stack
page read and write
894E000
stack
page read and write
5B27F000
stack
page read and write
3D8BE000
stack
page read and write
1367F000
stack
page read and write
F0CF000
stack
page read and write
9086000
heap
page read and write
2C03F000
stack
page read and write
3B1FE000
stack
page read and write
43AC000
unclassified section
page execute and read and write
3D9BF000
stack
page read and write
274BE000
stack
page read and write
309FF000
stack
page read and write
35DCC000
heap
page read and write
2837F000
stack
page read and write
4F3BF000
stack
page read and write
6483E000
stack
page read and write
45DDD000
unkown
page read and write
1863F000
stack
page read and write
2057E000
stack
page read and write
1613E000
stack
page read and write
34FE000
stack
page read and write
3027F000
stack
page read and write
586BF000
stack
page read and write
4B8FF000
stack
page read and write
5B90000
trusted library allocation
page read and write
3BCFF000
stack
page read and write
179FF000
stack
page read and write
6663E000
stack
page read and write
38FFF000
unkown
page read and write
477FF000
stack
page read and write
EE7E000
stack
page read and write
25A7E000
stack
page read and write
4603F000
stack
page read and write
392BE000
stack
page read and write
B74F000
stack
page read and write
569FF000
stack
page read and write
2917E000
stack
page read and write
6ADAE000
stack
page read and write
3C9BE000
stack
page read and write
149D000
trusted library allocation
page execute and read and write
F42F000
stack
page read and write
3800000
heap
page read and write
215BE000
stack
page read and write
321FE000
stack
page read and write
3EF3E000
stack
page read and write
5D07F000
stack
page read and write
6AD6F000
stack
page read and write
3553E000
stack
page read and write
1F9FF000
stack
page read and write
2D50000
heap
page read and write
344BF000
stack
page read and write
42B3E000
stack
page read and write
B3CE000
stack
page read and write
7260E000
stack
page read and write
1493000
trusted library allocation
page read and write
249FF000
stack
page read and write
5B8BF000
stack
page read and write
5C6BE000
stack
page read and write
38AFF000
stack
page read and write
146BF000
stack
page read and write
38D7F000
stack
page read and write
CDCF000
stack
page read and write
5C7BF000
stack
page read and write
1393E000
stack
page read and write
C00000
heap
page read and write
45D98000
unkown
page read and write
69BF000
stack
page read and write
5753F000
stack
page read and write
369F000
stack
page read and write
6C3F000
stack
page read and write
313FF000
stack
page read and write
6F5BE000
stack
page read and write
79B9E000
stack
page read and write
72BE000
stack
page read and write
4F63F000
stack
page read and write
1AFBE000
stack
page read and write
F70F000
stack
page read and write
66AFF000
stack
page read and write
1637F000
stack
page read and write
4D8C000
stack
page read and write
131BE000
stack
page read and write
3000000
heap
page read and write
2A4D000
heap
page read and write
3807E000
stack
page read and write
5320000
trusted library allocation
page read and write
2D0BE000
stack
page read and write
3243F000
stack
page read and write
1827F000
stack
page read and write
3D0FF000
stack
page read and write
57F7E000
stack
page read and write
6D5AE000
stack
page read and write
5D93F000
stack
page read and write
118BE000
stack
page read and write
90CE000
stack
page read and write
1BABF000
stack
page read and write
D40F000
stack
page read and write
759EE000
stack
page read and write
62B7E000
stack
page read and write
5D43F000
stack
page read and write
437BE000
stack
page read and write
178FE000
stack
page read and write
3F43E000
stack
page read and write
3637F000
stack
page read and write
3B07F000
stack
page read and write
775E000
stack
page read and write
DE0000
heap
page read and write
4AEFF000
stack
page read and write
E1CF000
stack
page read and write
890000
heap
page read and write
3DAFF000
stack
page read and write
382BF000
stack
page read and write
3C5BF000
stack
page read and write
749BF000
stack
page read and write
59BFF000
stack
page read and write
17A3E000
stack
page read and write
1ACFF000
stack
page read and write
4F67E000
stack
page read and write
10F7000
stack
page read and write
503FF000
stack
page read and write
4AA3E000
stack
page read and write
75DE000
stack
page read and write
2AA3F000
stack
page read and write
F940000
heap
page read and write
6307E000
stack
page read and write
2A43E000
stack
page read and write
123C000
stack
page read and write
2DBBF000
stack
page read and write
4EFE000
stack
page read and write
45DFE000
unkown
page read and write
13A0000
trusted library allocation
page read and write
44B7F000
stack
page read and write
7408F000
stack
page read and write
704AD000
unkown
page read and write
798DF000
stack
page read and write
26F7F000
stack
page read and write
4CF7F000
stack
page read and write
13F3F000
stack
page read and write
45BFE000
stack
page read and write
7DDDE000
stack
page read and write
4D37E000
stack
page read and write
516BF000
stack
page read and write
39F3E000
stack
page read and write
7DCF000
stack
page read and write
D8E000
stack
page read and write
4FB3F000
stack
page read and write
1165000
heap
page read and write
716CE000
stack
page read and write
3C97F000
stack
page read and write
DA8E000
stack
page read and write
E08F000
stack
page read and write
8FF000
heap
page read and write
6C8EF000
stack
page read and write
4F53E000
stack
page read and write
4963E000
stack
page read and write
B10000
heap
page read and write
57B7F000
stack
page read and write
5F77E000
stack
page read and write
2967E000
stack
page read and write
326FE000
stack
page read and write
A2E000
heap
page read and write
756E000
stack
page read and write
2FFFF000
stack
page read and write
913000
heap
page read and write
6FE1F000
stack
page read and write
309D000
stack
page read and write
16EFE000
stack
page read and write
2387F000
stack
page read and write
6CF2F000
stack
page read and write
45D5F000
unkown
page read and write
327F000
heap
page read and write
5297F000
stack
page read and write
61AFF000
stack
page read and write
398FE000
stack
page read and write
DE7000
heap
page read and write
4C6FE000
stack
page read and write
4263E000
stack
page read and write
4D73E000
stack
page read and write
1D7FE000
unkown
page read and write
514C000
stack
page read and write
129FF000
stack
page read and write
4B6BE000
stack
page read and write
25E0000
trusted library allocation
page read and write
345FF000
stack
page read and write
767E000
stack
page read and write
24EFF000
stack
page read and write
7900000
trusted library allocation
page execute and read and write
3247E000
stack
page read and write
1490000
trusted library allocation
page read and write
7E99E000
stack
page read and write
360FF000
stack
page read and write
259B000
trusted library allocation
page read and write
6D7F000
stack
page read and write
138FF000
stack
page read and write
24CBE000
stack
page read and write
18B0000
trusted library allocation
page read and write
59E7F000
stack
page read and write
792DE000
stack
page read and write
70490000
unkown
page readonly
37DFE000
stack
page read and write
7144E000
stack
page read and write
1C3BE000
stack
page read and write
6817F000
stack
page read and write
3477E000
stack
page read and write
7A69F000
stack
page read and write
F84F000
stack
page read and write
2157F000
stack
page read and write
2783F000
stack
page read and write
4C3E000
stack
page read and write
732E000
stack
page read and write
553BE000
stack
page read and write
1B37E000
stack
page read and write
5433F000
stack
page read and write
16FFF000
stack
page read and write
7BE5F000
stack
page read and write
56A3E000
stack
page read and write
4070000
trusted library allocation
page read and write
4607E000
stack
page read and write
1B0FE000
stack
page read and write
545FE000
stack
page read and write
7941E000
stack
page read and write
53E3F000
stack
page read and write
1811D000
heap
page read and write
6BA2E000
stack
page read and write
6AAEF000
stack
page read and write
5BFF000
stack
page read and write
68BE000
stack
page read and write
24B3F000
stack
page read and write
30D1000
trusted library allocation
page read and write
51A7F000
stack
page read and write
5C2FE000
stack
page read and write
6713F000
stack
page read and write
1CDBE000
stack
page read and write
763E000
stack
page read and write
45DD7000
unkown
page read and write
3517E000
stack
page read and write
78C5F000
stack
page read and write
6F33E000
stack
page read and write
7DB5E000
stack
page read and write
2337F000
stack
page read and write
46F7E000
stack
page read and write
410FE000
stack
page read and write
A30D000
stack
page read and write
61B3E000
stack
page read and write
3B7FF000
stack
page read and write
4507F000
stack
page read and write
3F7FE000
stack
page read and write
6ECFE000
stack
page read and write
7D75F000
stack
page read and write
970E000
stack
page read and write
5B20000
heap
page read and write
14B0000
trusted library allocation
page read and write
5043E000
stack
page read and write
63CBF000
stack
page read and write
5587F000
stack
page read and write
457FF000
stack
page read and write
521B000
stack
page read and write
4A2BE000
stack
page read and write
29EFF000
stack
page read and write
2EBFF000
stack
page read and write
EB90000
trusted library allocation
page read and write
614FE000
stack
page read and write
73C8E000
stack
page read and write
656FF000
stack
page read and write
2590000
trusted library allocation
page read and write
16B3E000
stack
page read and write
880E000
stack
page read and write
7A09E000
stack
page read and write
3C6FF000
stack
page read and write
15D3F000
stack
page read and write
1BBFF000
stack
page read and write
7951F000
stack
page read and write
61FFF000
stack
page read and write
14A2000
trusted library allocation
page read and write
2D5B000
heap
page read and write
564FF000
stack
page read and write
E87B000
stack
page read and write
4C07F000
stack
page read and write
610FF000
stack
page read and write
5B2BE000
stack
page read and write
F10E000
stack
page read and write
3BEF000
stack
page read and write
69AEE000
stack
page read and write
3E8FE000
stack
page read and write
4EBE000
stack
page read and write
6277F000
stack
page read and write
6EB7F000
stack
page read and write
82CF000
stack
page read and write
A5F000
heap
page read and write
42D7F000
stack
page read and write
773E000
stack
page read and write
DB0000
heap
page read and write
4597E000
stack
page read and write
3753E000
stack
page read and write
EE3E000
stack
page read and write
48EBE000
stack
page read and write
5A63E000
stack
page read and write
7C71F000
stack
page read and write
4E9FE000
stack
page read and write
4187E000
stack
page read and write
312FE000
stack
page read and write
45D59000
unkown
page read and write
5EFFE000
stack
page read and write
1523E000
stack
page read and write
E3B15DF000
stack
page read and write
5323F000
stack
page read and write
50D8000
trusted library allocation
page read and write
7E51F000
stack
page read and write
5473E000
stack
page read and write
72ACF000
stack
page read and write
46E3E000
stack
page read and write
2247F000
stack
page read and write
6936E000
stack
page read and write
51BBF000
stack
page read and write
7512E000
stack
page read and write
2927F000
stack
page read and write
6063F000
stack
page read and write
7B81F000
stack
page read and write
6C6AE000
stack
page read and write
44F3F000
stack
page read and write
A4CE000
stack
page read and write
4543F000
stack
page read and write
433FE000
stack
page read and write
5980000
heap
page read and write
1907E000
stack
page read and write
339BE000
stack
page read and write
704AD000
unkown
page read and write
73E000
stack
page read and write
1263F000
stack
page read and write
3701000
heap
page read and write
54A0000
trusted library allocation
page read and write
830E000
stack
page read and write
6B2000
system
page execute and read and write
3C83F000
stack
page read and write
4D6FF000
stack
page read and write
6D0AE000
stack
page read and write
1E73F000
stack
page read and write
21ABE000
stack
page read and write
331E000
stack
page read and write
66DBE000
stack
page read and write
6D1EE000
stack
page read and write
F4BE000
stack
page read and write
585BE000
stack
page read and write
12B3F000
stack
page read and write
8E0F000
stack
page read and write
618BE000
stack
page read and write
54F0000
trusted library allocation
page read and write
540BF000
stack
page read and write
2043E000
stack
page read and write
47CFF000
stack
page read and write
29DFE000
stack
page read and write
5F73F000
stack
page read and write
578FF000
stack
page read and write
568BF000
stack
page read and write
45DF2000
unkown
page read and write
6B66E000
stack
page read and write
B4CD000
stack
page read and write
1AE3F000
stack
page read and write
2327E000
stack
page read and write
627E000
stack
page read and write
DE4E000
stack
page read and write
238BE000
stack
page read and write
1F4FF000
stack
page read and write
B60F000
stack
page read and write
244FF000
stack
page read and write
180E000
stack
page read and write
C00F000
stack
page read and write
3193E000
stack
page read and write
349FE000
stack
page read and write
8D6000
trusted library allocation
page execute and read and write
5183E000
stack
page read and write
3BE7E000
stack
page read and write
724CE000
stack
page read and write
33AFE000
stack
page read and write
5B03E000
stack
page read and write
637F000
stack
page read and write
4F8FE000
stack
page read and write
5757E000
stack
page read and write
24DFE000
stack
page read and write
45DD4000
unkown
page read and write
73CCE000
stack
page read and write
79F1F000
stack
page read and write
57BBE000
stack
page read and write
2BDFE000
stack
page read and write
5EE7F000
stack
page read and write
4B17F000
stack
page read and write
303B000
stack
page read and write
4223F000
stack
page read and write
D08E000
stack
page read and write
D1CE000
stack
page read and write
5E47F000
stack
page read and write
128D000
heap
page read and write
D80E000
stack
page read and write
926E000
stack
page read and write
3301000
heap
page read and write
63F7E000
stack
page read and write
4927E000
stack
page read and write
196BE000
stack
page read and write
6CE2E000
stack
page read and write
2D1BF000
stack
page read and write
55EFE000
stack
page read and write
1B47F000
stack
page read and write
A8EF000
stack
page read and write
717E000
stack
page read and write
5D1FE000
stack
page read and write
54E7F000
stack
page read and write
43DFE000
stack
page read and write
1348000
heap
page read and write
57DFF000
stack
page read and write
7D0000
heap
page read and write
FF1000
heap
page read and write
3E77F000
stack
page read and write
6C4E000
stack
page read and write
856E000
stack
page read and write
7E9DE000
stack
page read and write
5FEFE000
stack
page read and write
4BF3F000
stack
page read and write
33D7E000
stack
page read and write
A32000
heap
page read and write
20CBF000
stack
page read and write
6FF5E000
stack
page read and write
4F13F000
stack
page read and write
6FFF000
stack
page read and write
137D000
trusted library allocation
page execute and read and write
3CEBE000
stack
page read and write
5CDFF000
stack
page read and write
7641E000
stack
page read and write
9E4F000
stack
page read and write
5B3FE000
stack
page read and write
6C06E000
stack
page read and write
2ED7E000
stack
page read and write
4E9BF000
stack
page read and write
61C7E000
stack
page read and write
7378E000
stack
page read and write
9ACE000
stack
page read and write
1CB3E000
stack
page read and write
B01000
heap
page read and write
5806000
trusted library section
page readonly
29FD000
stack
page read and write
10F0000
heap
page read and write
4FA0000
trusted library allocation
page execute and read and write
5157F000
stack
page read and write
405BE000
stack
page read and write
7849F000
stack
page read and write
316BE000
stack
page read and write
29CBE000
stack
page read and write
5630000
trusted library allocation
page read and write
54F6000
trusted library allocation
page read and write
5B17E000
stack
page read and write
597F000
stack
page read and write
2BDA000
heap
page read and write
7780000
trusted library allocation
page execute and read and write
4CA7F000
stack
page read and write
7EEFF000
stack
page read and write
2D47E000
stack
page read and write
243FE000
stack
page read and write
48FFE000
stack
page read and write
50CBF000
stack
page read and write
E58F000
stack
page read and write
1E23F000
stack
page read and write
582FF000
stack
page read and write
225FE000
stack
page read and write
5093E000
stack
page read and write
EF7E000
stack
page read and write
544BE000
stack
page read and write
9CD000
heap
page read and write
525D000
stack
page read and write
5437E000
stack
page read and write
76F0000
trusted library allocation
page read and write
FC0F000
stack
page read and write
26CFF000
stack
page read and write
5E5FE000
stack
page read and write
5340000
trusted library allocation
page execute and read and write
2C2FE000
stack
page read and write
41BFF000
stack
page read and write
E7E000
unkown
page readonly
45DC8000
unkown
page read and write
78BF000
stack
page read and write
14D3E000
stack
page read and write
211FE000
stack
page read and write
40A7F000
stack
page read and write
596FF000
stack
page read and write
5590000
heap
page read and write
59EBE000
stack
page read and write
4B07E000
stack
page read and write
A23000
heap
page read and write
5AC3F000
stack
page read and write
312BF000
stack
page read and write
4E7F000
stack
page read and write
65D3F000
stack
page read and write
4E87F000
stack
page read and write
687BF000
stack
page read and write
66EFE000
stack
page read and write
1724000
trusted library allocation
page read and write
1CC3F000
stack
page read and write
4E8BE000
stack
page read and write
66C7E000
stack
page read and write
1D3FE000
stack
page read and write
1E8BE000
stack
page read and write
45D68000
unkown
page read and write
A27000
heap
page read and write
14B7000
trusted library allocation
page execute and read and write
159BE000
stack
page read and write
536FF000
stack
page read and write
47E3F000
stack
page read and write
9A0000
heap
page readonly
4873E000
stack
page read and write
E20000
heap
page read and write
501BE000
stack
page read and write
1177E000
stack
page read and write
1C23F000
stack
page read and write
AECE000
stack
page read and write
2E6FF000
stack
page read and write
58F0000
heap
page read and write
5670000
trusted library allocation
page read and write
1726000
trusted library allocation
page read and write
1A33E000
stack
page read and write
3BD3E000
stack
page read and write
2C8C000
stack
page read and write
678BF000
stack
page read and write
41ABF000
stack
page read and write
6357E000
stack
page read and write
372BE000
stack
page read and write
704AD000
unkown
page read and write
18E0000
trusted library allocation
page read and write
6303F000
stack
page read and write
4AB7E000
stack
page read and write
45DC5000
unkown
page read and write
5CE3E000
stack
page read and write
63A000
stack
page read and write
7C39E000
stack
page read and write
61D7F000
stack
page read and write
5A20000
trusted library allocation
page execute and read and write
7A2DF000
stack
page read and write
7D29E000
stack
page read and write
4CCFF000
stack
page read and write
6027F000
stack
page read and write
1903F000
stack
page read and write
2BDBF000
stack
page read and write
13CBF000
stack
page read and write
303FE000
stack
page read and write
21FBE000
stack
page read and write
9D3000
heap
page read and write
2B3A000
trusted library allocation
page read and write
2F5FF000
stack
page read and write
7769E000
stack
page read and write
4617F000
stack
page read and write
216BF000
stack
page read and write
677BE000
stack
page read and write
D6F000
unkown
page read and write
A1D000
heap
page read and write
30E7000
trusted library allocation
page read and write
5CF7E000
stack
page read and write
4823E000
stack
page read and write
7BA9F000
stack
page read and write
2223E000
stack
page read and write
150FE000
stack
page read and write
14CFF000
stack
page read and write
ED4E000
stack
page read and write
133E000
stack
page read and write
5E0FE000
stack
page read and write
481FF000
stack
page read and write
2D33E000
stack
page read and write
299FF000
stack
page read and write
F98F000
stack
page read and write
577BF000
stack
page read and write
4977E000
stack
page read and write
E6CF000
stack
page read and write
4B57E000
stack
page read and write
2197E000
stack
page read and write
5DABE000
stack
page read and write
594BE000
stack
page read and write
5CB000
stack
page read and write
6F2FF000
stack
page read and write
8B0000
heap
page read and write
2463F000
stack
page read and write
537F000
stack
page read and write
629FF000
stack
page read and write
41B1000
trusted library allocation
page read and write
45DB0000
unkown
page read and write
1F17E000
stack
page read and write
36C3F000
stack
page read and write
63A3F000
stack
page read and write
34AFF000
stack
page read and write
5D6BF000
stack
page read and write
1B97F000
stack
page read and write
5603000
heap
page read and write
2693F000
stack
page read and write
25AE000
trusted library allocation
page read and write
B10F000
stack
page read and write
5383E000
stack
page read and write
2287E000
stack
page read and write
C14F000
stack
page read and write
14F0000
trusted library allocation
page execute and read and write
6E7BF000
stack
page read and write
D68F000
stack
page read and write
44CBF000
stack
page read and write
6D06F000
stack
page read and write
45D38000
unkown
page read and write
6D6AF000
stack
page read and write
5540000
heap
page execute and read and write
3D9E000
stack
page read and write
9DA000
heap
page read and write
56E2000
trusted library allocation
page read and write
5D1BF000
stack
page read and write
8B8F000
stack
page read and write
4BEF000
stack
page read and write
3F53F000
stack
page read and write
33A2000
trusted library allocation
page read and write
4051000
trusted library allocation
page read and write
7B1DF000
stack
page read and write
22D7E000
stack
page read and write
5E1FF000
stack
page read and write
5B8FE000
stack
page read and write
2E23E000
stack
page read and write
7FBCE000
stack
page read and write
41B9000
trusted library allocation
page read and write
19A3F000
stack
page read and write
5983F000
stack
page read and write
DD0000
trusted library allocation
page read and write
2FD7F000
stack
page read and write
34D7F000
stack
page read and write
64E3F000
stack
page read and write
2A47000
heap
page read and write
1FDFE000
stack
page read and write
7E0E000
stack
page read and write
33C0000
heap
page read and write
128FE000
stack
page read and write
62F3E000
stack
page read and write
96CF000
stack
page read and write
577FE000
stack
page read and write
11C7E000
stack
page read and write
2B27F000
stack
page read and write
64D3E000
stack
page read and write
30DFE000
stack
page read and write
40E7E000
stack
page read and write
4AC7F000
stack
page read and write
6B9EF000
stack
page read and write
168BE000
stack
page read and write
41EBE000
stack
page read and write
2A2FE000
stack
page read and write
920E000
stack
page read and write
137BF000
stack
page read and write
1D03E000
stack
page read and write
1073E000
stack
page read and write
128BF000
stack
page read and write
AE0000
trusted library allocation
page execute and read and write
335FE000
stack
page read and write
16AFF000
stack
page read and write
3F57E000
stack
page read and write
782E000
stack
page read and write
68B7F000
stack
page read and write
9C0E000
stack
page read and write
62C7F000
stack
page read and write
A84F000
stack
page read and write
4C97E000
stack
page read and write
79F5E000
stack
page read and write
5FB3E000
stack
page read and write
2903E000
stack
page read and write
5A3BE000
stack
page read and write
6C3EF000
stack
page read and write
4A8BF000
stack
page read and write
785E000
stack
page read and write
17D0000
trusted library allocation
page read and write
5C57E000
stack
page read and write
34EFE000
stack
page read and write
2787E000
stack
page read and write
28EFE000
stack
page read and write
26BFE000
stack
page read and write
77C9F000
stack
page read and write
142FF000
stack
page read and write
6B7AE000
stack
page read and write
63A000
stack
page read and write
2CA3F000
stack
page read and write
220FE000
stack
page read and write
4F4FF000
stack
page read and write
3DD7F000
stack
page read and write
7F94E000
stack
page read and write
5FC7E000
stack
page read and write
5E33F000
stack
page read and write
45DF5000
unkown
page read and write
5BB7E000
stack
page read and write
13C7000
heap
page read and write
289FE000
stack
page read and write
EABE000
stack
page read and write
6D6EE000
stack
page read and write
AB2000
trusted library allocation
page read and write
6BB6E000
stack
page read and write
4793F000
stack
page read and write
1BD3F000
stack
page read and write
1AD3E000
stack
page read and write
4987F000
stack
page read and write
2003F000
stack
page read and write
284FE000
stack
page read and write
622BE000
stack
page read and write
6ECBF000
stack
page read and write
F48F000
stack
page read and write
46DFF000
stack
page read and write
87E000
stack
page read and write
5997F000
stack
page read and write
5D47E000
stack
page read and write
C68E000
stack
page read and write
1480000
trusted library allocation
page read and write
564E000
trusted library allocation
page read and write
51E6000
heap
page read and write
4457E000
stack
page read and write
CB8E000
stack
page read and write
E21D000
stack
page read and write
7F80E000
stack
page read and write
4BBBE000
stack
page read and write
3373E000
stack
page read and write
613E000
stack
page read and write
7118F000
stack
page read and write
3A67F000
stack
page read and write
664FE000
stack
page read and write
749FE000
stack
page read and write
45D8C000
unkown
page read and write
17EFF000
stack
page read and write
1A07F000
stack
page read and write
415FE000
stack
page read and write
17CBE000
stack
page read and write
7328E000
stack
page read and write
318FF000
stack
page read and write
A12000
heap
page read and write
65AFE000
stack
page read and write
2D97E000
stack
page read and write
462BF000
stack
page read and write
8D2000
trusted library allocation
page read and write
BA0E000
stack
page read and write
52D3F000
stack
page read and write
49EFE000
stack
page read and write
2747000
trusted library allocation
page read and write
10AFE000
stack
page read and write
6201000
heap
page read and write
5FD7F000
stack
page read and write
54D7E000
stack
page read and write
1500000
trusted library allocation
page read and write
2F4B000
stack
page read and write
78B0000
trusted library section
page read and write
6573E000
stack
page read and write
64F7F000
stack
page read and write
78C9E000
stack
page read and write
4213E000
stack
page read and write
4ADFE000
stack
page read and write
1CEFE000
stack
page read and write
5DA7F000
stack
page read and write
B9C000
stack
page read and write
40ABE000
stack
page read and write
BBAE000
stack
page read and write
3D37F000
stack
page read and write
6A9AF000
stack
page read and write
2323F000
stack
page read and write
6203E000
stack
page read and write
511BF000
stack
page read and write
3DFFF000
stack
page read and write
3F93E000
stack
page read and write
2CB7F000
stack
page read and write
39DBF000
stack
page read and write
1B4BE000
stack
page read and write
385BE000
stack
page read and write
174FF000
stack
page read and write
AE8F000
stack
page read and write
21E3F000
stack
page read and write
11BD000
heap
page read and write
22BFF000
stack
page read and write
C170000
trusted library section
page read and write
5D0BE000
stack
page read and write
3FDE000
stack
page read and write
7284F000
stack
page read and write
3750000
trusted library allocation
page read and write
77D9F000
stack
page read and write
7428E000
stack
page read and write
2507E000
stack
page read and write
5290000
heap
page read and write
4937F000
stack
page read and write
1127E000
stack
page read and write
3AF7E000
stack
page read and write
308BF000
stack
page read and write
3763F000
stack
page read and write
4057F000
stack
page read and write
319E000
stack
page read and write
4A53E000
stack
page read and write
104BE000
stack
page read and write
2913F000
stack
page read and write
590BF000
stack
page read and write
50DFF000
stack
page read and write
51EC000
stack
page read and write
55FFF000
stack
page read and write
7260000
heap
page read and write
485BF000
stack
page read and write
29DBF000
stack
page read and write
5510000
trusted library allocation
page read and write
3437F000
stack
page read and write
7A45E000
stack
page read and write
539E000
heap
page read and write
17DB000
trusted library allocation
page read and write
1CD7F000
stack
page read and write
68A7E000
stack
page read and write
1383000
trusted library allocation
page read and write
51E3F000
stack
page read and write
3BBBF000
stack
page read and write
4ABF000
stack
page read and write
5313E000
stack
page read and write
4D97F000
stack
page read and write
AC4E000
stack
page read and write
5E73E000
stack
page read and write
33ABF000
stack
page read and write
132E000
heap
page read and write
164BF000
stack
page read and write
D3B000
stack
page read and write
2C4F000
stack
page read and write
3EB7E000
stack
page read and write
8F68000
heap
page read and write
2A8FF000
stack
page read and write
31B1000
trusted library allocation
page read and write
3E8BF000
stack
page read and write
6F8C000
stack
page read and write
725CF000
stack
page read and write
45DCB000
unkown
page read and write
3CAFE000
stack
page read and write
EBDD000
stack
page read and write
1677E000
stack
page read and write
2E2E000
stack
page read and write
7E41E000
stack
page read and write
4DFBF000
stack
page read and write
922E000
stack
page read and write
5833E000
stack
page read and write
FB7E000
stack
page read and write
22EBE000
stack
page read and write
52EC000
stack
page read and write
198FF000
stack
page read and write
858E000
stack
page read and write
45DB3000
unkown
page read and write
234BF000
stack
page read and write
6C92E000
stack
page read and write
D04F000
stack
page read and write
369FE000
stack
page read and write
1627E000
stack
page read and write
45D3B000
unkown
page read and write
38DBE000
stack
page read and write
49FFF000
stack
page read and write
6173F000
stack
page read and write
43B7E000
stack
page read and write
A74E000
stack
page read and write
466BE000
stack
page read and write
5E0BF000
stack
page read and write
151B000
heap
page read and write
1023E000
stack
page read and write
7D51E000
stack
page read and write
C3CF000
stack
page read and write
C60000
heap
page read and write
FAE000
stack
page read and write
C90E000
stack
page read and write
1687F000
stack
page read and write
7190F000
stack
page read and write
90CD000
stack
page read and write
958F000
stack
page read and write
23EFE000
stack
page read and write
37B7E000
stack
page read and write
3B0BE000
stack
page read and write
2823F000
stack
page read and write
3CD7E000
stack
page read and write
35A3E000
stack
page read and write
12EFF000
stack
page read and write
3DC3F000
stack
page read and write
51F7F000
stack
page read and write
6DFAE000
stack
page read and write
1597F000
stack
page read and write
6867F000
stack
page read and write
74DE000
stack
page read and write
2F77E000
stack
page read and write
7BE9E000
stack
page read and write
471000
remote allocation
page execute and read and write
243BF000
stack
page read and write
6EA3F000
unkown
page read and write
640BE000
stack
page read and write
7F010000
trusted library allocation
page execute and read and write
7C11E000
stack
page read and write
2A7BF000
stack
page read and write
2A53F000
stack
page read and write
16C7E000
stack
page read and write
6AFEF000
stack
page read and write
BCED000
stack
page read and write
4A67E000
stack
page read and write
A2E000
heap
page read and write
5BB3F000
stack
page read and write
C3B000
heap
page read and write
239BF000
stack
page read and write
1A1BF000
stack
page read and write
6BCAE000
stack
page read and write
7A19F000
stack
page read and write
15ED000
trusted library allocation
page execute and read and write
2A57E000
stack
page read and write
3051000
trusted library allocation
page read and write
20A7E000
stack
page read and write
3E9FF000
stack
page read and write
2EAFE000
stack
page read and write
74DBE000
stack
page read and write
5143F000
stack
page read and write
1239000
heap
page read and write
359E000
stack
page read and write
CB4F000
stack
page read and write
5197E000
stack
page read and write
1C77E000
stack
page read and write
1810000
trusted library allocation
page read and write
336C000
unclassified section
page execute and read and write
60FBF000
stack
page read and write
53CFF000
stack
page read and write
7CFDF000
stack
page read and write
35FFE000
stack
page read and write
DA9000
stack
page read and write
1917F000
stack
page read and write
44BBE000
stack
page read and write
E4E000
stack
page read and write
2D8F000
stack
page read and write
18B3F000
stack
page read and write
6B3AF000
stack
page read and write
3487F000
stack
page read and write
1877F000
stack
page read and write
4923F000
stack
page read and write
3002000
heap
page read and write
2F87F000
stack
page read and write
6B8EE000
stack
page read and write
4033E000
stack
page read and write
603FE000
stack
page read and write
7A6DE000
stack
page read and write
E44F000
stack
page read and write
6447E000
stack
page read and write
5390000
heap
page read and write
115FF000
stack
page read and write
320BE000
stack
page read and write
70490000
unkown
page readonly
19E3E000
stack
page read and write
189FF000
stack
page read and write
7210E000
stack
page read and write
1967F000
stack
page read and write
739CF000
stack
page read and write
47FBE000
stack
page read and write
74C3F000
stack
page read and write
E40000
heap
page read and write
461BE000
stack
page read and write
587FF000
stack
page read and write
2DE7E000
stack
page read and write
7CD5F000
stack
page read and write
45D3E000
unkown
page read and write
4CABE000
stack
page read and write
68A3F000
stack
page read and write
44BF000
stack
page read and write
5DE7E000
stack
page read and write
6407F000
stack
page read and write
2F50000
heap
page read and write
753E000
stack
page read and write
1DD7E000
stack
page read and write
2FCE000
stack
page read and write
4E73F000
stack
page read and write
401BF000
stack
page read and write
4AB3F000
stack
page read and write
A9CE000
stack
page read and write
2B2BE000
stack
page read and write
B8CE000
stack
page read and write
73F8E000
stack
page read and write
21CFF000
stack
page read and write
8D10000
heap
page read and write
960000
heap
page read and write
6922E000
stack
page read and write
5A9FE000
stack
page read and write
36D7F000
stack
page read and write
6443F000
stack
page read and write
678FE000
stack
page read and write
58A0000
heap
page read and write
2B8BF000
unkown
page read and write
60C3E000
stack
page read and write
3E2BE000
stack
page read and write
79DDF000
stack
page read and write
57A3000
heap
page read and write
7B09F000
stack
page read and write
642FF000
stack
page read and write
F93C000
stack
page read and write
4CD3E000
stack
page read and write
8EF0000
heap
page read and write
21BBF000
stack
page read and write
109BE000
stack
page read and write
7A41F000
stack
page read and write
272F000
stack
page read and write
7809F000
stack
page read and write
6523E000
stack
page read and write
4DC3E000
stack
page read and write
4DD3F000
stack
page read and write
2A93E000
stack
page read and write
3ACBF000
stack
page read and write
32FE000
stack
page read and write
59C3E000
stack
page read and write
3F03F000
stack
page read and write
3383F000
stack
page read and write
2E1FF000
stack
page read and write
5287E000
stack
page read and write
1B73E000
stack
page read and write
36FFF000
stack
page read and write
1583F000
stack
page read and write
58E7E000
stack
page read and write
4593F000
stack
page read and write
48AFE000
stack
page read and write
5DFBE000
stack
page read and write
35B3F000
stack
page read and write
4EC7E000
stack
page read and write
5667E000
stack
page read and write
45DE9000
unkown
page read and write
57F0000
trusted library allocation
page read and write
51E7E000
stack
page read and write
3A3FF000
stack
page read and write
8DBE000
stack
page read and write
DE5000
heap
page read and write
6A86F000
stack
page read and write
4407E000
stack
page read and write
BD5D000
stack
page read and write
425FF000
stack
page read and write
ED0F000
stack
page read and write
BECF000
stack
page read and write
6CB6F000
stack
page read and write
30F0000
trusted library allocation
page read and write
4BA3F000
stack
page read and write
3EDE000
stack
page read and write
2BA3E000
stack
page read and write
50B7F000
stack
page read and write
EACE000
stack
page read and write
3207F000
stack
page read and write
1C0FF000
stack
page read and write
8A0000
trusted library allocation
page read and write
4B2FE000
stack
page read and write
298FE000
stack
page read and write
8E8D000
stack
page read and write
7C35F000
stack
page read and write
95CE000
stack
page read and write
5C03F000
stack
page read and write
5AAFF000
stack
page read and write
FEE000
stack
page read and write
B970000
heap
page read and write
5C2BF000
stack
page read and write
6F0BE000
stack
page read and write
377BE000
stack
page read and write
6EFE000
stack
page read and write
1F03E000
stack
page read and write
E98E000
stack
page read and write
1CEBF000
stack
page read and write
6187F000
stack
page read and write
5017F000
stack
page read and write
45D41000
unkown
page read and write
79B5F000
stack
page read and write
511FE000
stack
page read and write
20F3F000
stack
page read and write
8E4E000
stack
page read and write
19F3F000
stack
page read and write
A42000
heap
page read and write
1647000
heap
page read and write
727F000
stack
page read and write
2143F000
stack
page read and write
551D000
stack
page read and write
14BBF000
stack
page read and write
1A2FF000
stack
page read and write
57A7E000
stack
page read and write
17DBF000
stack
page read and write
6D82E000
stack
page read and write
854F000
stack
page read and write
3913F000
stack
page read and write
1E5FF000
stack
page read and write
62CBE000
stack
page read and write
FECE000
unkown
page read and write
2E83F000
stack
page read and write
850000
heap
page read and write
2D07F000
stack
page read and write
45D5C000
unkown
page read and write
1717E000
stack
page read and write
6B76F000
stack
page read and write
5ABF000
stack
page read and write
3A03F000
stack
page read and write
984E000
stack
page read and write
58B0000
trusted library allocation
page read and write
B00E000
stack
page read and write
1FB7E000
stack
page read and write
682BF000
stack
page read and write
160A000
trusted library allocation
page execute and read and write
3FA7E000
stack
page read and write
1267E000
stack
page read and write
4D3F000
stack
page read and write
7374F000
stack
page read and write
1753E000
stack
page read and write
A62000
heap
page read and write
7553F000
stack
page read and write
45EFF000
stack
page read and write
7590E000
stack
page read and write
7CB1E000
stack
page read and write
7CE9F000
stack
page read and write
61EFE000
stack
page read and write
7288E000
stack
page read and write
3A6BE000
stack
page read and write
49C3F000
stack
page read and write
45BF000
stack
page read and write
45DF8000
unkown
page read and write
2953E000
stack
page read and write
2697E000
stack
page read and write
1815000
trusted library allocation
page read and write
471000
remote allocation
page execute and read and write
1213F000
stack
page read and write
9E0000
heap
page read and write
6B62F000
stack
page read and write
A24E000
stack
page read and write
78EDF000
stack
page read and write
4DEBE000
stack
page read and write
846E000
stack
page read and write
7940000
heap
page read and write
2E97F000
stack
page read and write
4303E000
stack
page read and write
67DBF000
stack
page read and write
137FE000
stack
page read and write
6537E000
stack
page read and write
8AC6000
heap
page read and write
3297E000
stack
page read and write
9F8F000
stack
page read and write
5B9FF000
stack
page read and write
5C3FF000
stack
page read and write
4C1FE000
stack
page read and write
33FFE000
stack
page read and write
3843E000
stack
page read and write
5D83E000
stack
page read and write
1ABBF000
stack
page read and write
5E83F000
stack
page read and write
43B3F000
stack
page read and write
323F000
heap
page read and write
55C0000
trusted library allocation
page execute and read and write
18B7E000
stack
page read and write
72B0E000
stack
page read and write
ABB000
trusted library allocation
page execute and read and write
69D2F000
stack
page read and write
39C7F000
stack
page read and write
5960000
heap
page read and write
3C1FF000
stack
page read and write
5707E000
stack
page read and write
85DD000
heap
page read and write
1137F000
stack
page read and write
397BE000
stack
page read and write
650BF000
stack
page read and write
1CC7E000
stack
page read and write
2543E000
stack
page read and write
4BCBF000
stack
page read and write
1433E000
stack
page read and write
81CE000
stack
page read and write
7CC1F000
stack
page read and write
3567E000
stack
page read and write
45DDA000
unkown
page read and write
7F13F000
stack
page read and write
7E2DE000
stack
page read and write
48D7E000
stack
page read and write
341F000
stack
page read and write
1510000
heap
page read and write
1ABFE000
stack
page read and write
87E000
stack
page read and write
529E000
stack
page read and write
442FE000
stack
page read and write
56FF000
stack
page read and write
48CC000
stack
page read and write
75BEE000
stack
page read and write
5483F000
stack
page read and write
7E29F000
stack
page read and write
4A3FE000
stack
page read and write
3D3BE000
stack
page read and write
9AE000
stack
page read and write
1370000
trusted library allocation
page read and write
32F7F000
stack
page read and write
212FF000
stack
page read and write
411FF000
stack
page read and write
5AB3E000
stack
page read and write
24A3E000
stack
page read and write
494FE000
stack
page read and write
13B5000
heap
page read and write
40D3E000
stack
page read and write
5CB7F000
stack
page read and write
3337E000
stack
page read and write
462FE000
stack
page read and write
4DE7F000
stack
page read and write
73BF000
stack
page read and write
5703F000
stack
page read and write
4C1BF000
stack
page read and write
2F63E000
stack
page read and write
595FE000
stack
page read and write
6F57F000
stack
page read and write
3A2BF000
stack
page read and write
151FF000
stack
page read and write
4BE000
stack
page read and write
526FF000
stack
page read and write
646BF000
stack
page read and write
4A27F000
stack
page read and write
126F000
heap
page read and write
191BE000
stack
page read and write
6067E000
stack
page read and write
6217E000
stack
page read and write
3CFBF000
stack
page read and write
5750000
heap
page read and write
1B33F000
stack
page read and write
5690000
trusted library allocation
page read and write
6673F000
stack
page read and write
2C17F000
stack
page read and write
334BE000
stack
page read and write
4B93E000
stack
page read and write
6AEAF000
stack
page read and write
1DAFF000
stack
page read and write
F46D000
stack
page read and write
7979F000
stack
page read and write
B9E000
stack
page read and write
930F000
stack
page read and write
8570000
heap
page read and write
3FB7F000
stack
page read and write
8B4000
trusted library allocation
page read and write
3063F000
stack
page read and write
3347F000
stack
page read and write
3A57E000
stack
page read and write
5500000
trusted library allocation
page read and write
A3D000
heap
page read and write
56DFE000
stack
page read and write
5AFFF000
stack
page read and write
5EC3E000
stack
page read and write
25B6000
trusted library allocation
page read and write
76AF000
stack
page read and write
DA4F000
stack
page read and write
7324F000
stack
page read and write
3A7BF000
stack
page read and write
4D7E000
stack
page read and write
71BF0000
heap
page read and write
239FE000
stack
page read and write
3E4FF000
stack
page read and write
510BE000
stack
page read and write
5513E000
stack
page read and write
53D3E000
stack
page read and write
260BE000
stack
page read and write
7C89E000
stack
page read and write
12DBF000
stack
page read and write
475000
remote allocation
page execute and read and write
30B0000
heap
page read and write
73B0F000
stack
page read and write
2BB7E000
stack
page read and write
25BBE000
stack
page read and write
45A7F000
stack
page read and write
304E000
stack
page read and write
73A0E000
stack
page read and write
6B52E000
stack
page read and write
322FF000
stack
page read and write
6C16F000
stack
page read and write
7C8F000
stack
page read and write
20DFF000
stack
page read and write
6DBAF000
stack
page read and write
28C7E000
stack
page read and write
7E91E000
stack
page read and write
4D1E000
stack
page read and write
A48F000
stack
page read and write
45B0000
heap
page read and write
30B3F000
stack
page read and write
76F9000
trusted library allocation
page read and write
22D3F000
stack
page read and write
FACF000
stack
page read and write
30EFF000
stack
page read and write
3E03E000
stack
page read and write
A7AC000
stack
page read and write
9E8000
heap
page read and write
6E43E000
stack
page read and write
E94F000
stack
page read and write
45D7A000
unkown
page read and write
68F3F000
stack
page read and write
37A3E000
stack
page read and write
2F0D000
stack
page read and write
2E47F000
stack
page read and write
443FF000
stack
page read and write
50F7E000
stack
page read and write
66D7F000
stack
page read and write
7879F000
stack
page read and write
5BCBE000
stack
page read and write
12FE000
stack
page read and write
672BE000
stack
page read and write
777F000
stack
page read and write
27ABF000
stack
page read and write
3B93F000
stack
page read and write
6996F000
stack
page read and write
608FE000
stack
page read and write
2D6FE000
stack
page read and write
18DFE000
stack
page read and write
18CBE000
stack
page read and write
7F27F000
stack
page read and write
5573F000
stack
page read and write
17FD000
trusted library allocation
page read and write
3FCBF000
stack
page read and write
57B0000
trusted library allocation
page execute and read and write
27AA000
trusted library allocation
page read and write
447BF000
stack
page read and write
F34F000
stack
page read and write
17B7E000
stack
page read and write
2FEF000
unkown
page read and write
47D3E000
stack
page read and write
1B9BE000
stack
page read and write
41FBF000
stack
page read and write
3425000
trusted library allocation
page read and write
1640000
heap
page read and write
3AB7F000
stack
page read and write
2DE3F000
stack
page read and write
5FE000
stack
page read and write
322E000
heap
page read and write
43C7F000
stack
page read and write
619BF000
stack
page read and write
11D0000
heap
page read and write
5A8BE000
stack
page read and write
56F0000
heap
page read and write
2377E000
stack
page read and write
2D7FF000
stack
page read and write
46A7E000
stack
page read and write
C78F000
stack
page read and write
165FF000
stack
page read and write
4377F000
stack
page read and write
221FF000
stack
page read and write
6B3E000
stack
page read and write
6DD2E000
stack
page read and write
55FE000
stack
page read and write
7539E000
stack
page read and write
4693E000
stack
page read and write
1500000
heap
page read and write
5AC7E000
stack
page read and write
1BEBE000
stack
page read and write
7645E000
stack
page read and write
7CEDE000
stack
page read and write
1537E000
stack
page read and write
53DF000
stack
page read and write
2DCE000
stack
page read and write
4D1FF000
stack
page read and write
1953F000
stack
page read and write
24B7E000
stack
page read and write
7FA4F000
stack
page read and write
207BF000
stack
page read and write
45DB9000
unkown
page read and write
7AE1F000
stack
page read and write
2A17F000
stack
page read and write
3A7FE000
stack
page read and write
F32D000
stack
page read and write
2CE3E000
stack
page read and write
6A4AF000
stack
page read and write
2373F000
stack
page read and write
14A7F000
stack
page read and write
A27000
heap
page read and write
5107F000
stack
page read and write
10C3E000
stack
page read and write
447FE000
stack
page read and write
5740000
trusted library allocation
page execute and read and write
DD0E000
stack
page read and write
2ABBE000
stack
page read and write
10EBE000
stack
page read and write
3393000
trusted library allocation
page read and write
2453E000
stack
page read and write
2CE000
stack
page read and write
BF0E000
stack
page read and write
691EF000
stack
page read and write
24C7F000
stack
page read and write
1600000
trusted library allocation
page read and write
A20000
heap
page read and write
5C3E000
stack
page read and write
6587E000
stack
page read and write
2DFBE000
stack
page read and write
45D4A000
unkown
page read and write
34C0000
trusted library allocation
page read and write
1957E000
stack
page read and write
526C000
stack
page read and write
65FF000
stack
page read and write
146FE000
stack
page read and write
5947F000
stack
page read and write
6B4E000
stack
page read and write
4043F000
stack
page read and write
44DFF000
stack
page read and write
9BCF000
stack
page read and write
5BF000
stack
page read and write
5133E000
stack
page read and write
10ABF000
stack
page read and write
6D42F000
stack
page read and write
3B47E000
stack
page read and write
51ABE000
stack
page read and write
3C5FE000
stack
page read and write
6B26F000
stack
page read and write
581FE000
stack
page read and write
411B000
stack
page read and write
71CF000
stack
page read and write
AC0F000
stack
page read and write
18DBF000
stack
page read and write
D44E000
stack
page read and write
6457F000
stack
page read and write
4F70000
trusted library allocation
page read and write
6A12E000
stack
page read and write
7F4E000
stack
page read and write
2B00000
heap
page read and write
6972E000
stack
page read and write
1BD7E000
stack
page read and write
270BF000
stack
page read and write
45DB6000
unkown
page read and write
54DD000
trusted library allocation
page read and write
3C0BF000
stack
page read and write
1DD3F000
stack
page read and write
19B7F000
stack
page read and write
7D89F000
stack
page read and write
48FBF000
stack
page read and write
3E9F000
stack
page read and write
1A47E000
stack
page read and write
4C47E000
stack
page read and write
63E3E000
stack
page read and write
541FF000
stack
page read and write
60FF000
stack
page read and write
270FE000
stack
page read and write
15A7000
heap
page read and write
1630000
trusted library allocation
page read and write
4BE3E000
stack
page read and write
4A8FE000
stack
page read and write
77CE000
stack
page read and write
21A7F000
stack
page read and write
7DF1E000
stack
page read and write
A38E000
stack
page read and write
3EA3E000
stack
page read and write
29B3F000
stack
page read and write
414BE000
stack
page read and write
1037E000
stack
page read and write
3F7BF000
stack
page read and write
3505000
trusted library allocation
page read and write
6687F000
stack
page read and write
7300E000
stack
page read and write
6EF3F000
stack
page read and write
836F000
stack
page read and write
68DFF000
stack
page read and write
641BF000
stack
page read and write
36DB000
stack
page read and write
7CC5E000
stack
page read and write
6E2FF000
stack
page read and write
5A85000
heap
page read and write
3A1BE000
stack
page read and write
1227F000
stack
page read and write
2E0BF000
stack
page read and write
23B3E000
stack
page read and write
1083F000
stack
page read and write
8C3000
trusted library allocation
page read and write
4D0FE000
stack
page read and write
8F8E000
stack
page read and write
4123E000
stack
page read and write
2313E000
stack
page read and write
406BF000
stack
page read and write
248BF000
stack
page read and write
307BE000
stack
page read and write
55C3F000
stack
page read and write
4583E000
stack
page read and write
4D90000
heap
page read and write
717E000
heap
page read and write
5E37E000
stack
page read and write
294FF000
stack
page read and write
E97C000
stack
page read and write
994F000
stack
page read and write
36EBF000
stack
page read and write
3E13F000
stack
page read and write
2EEBE000
stack
page read and write
2D43F000
stack
page read and write
13CFE000
stack
page read and write
3A2FE000
stack
page read and write
5EEBE000
stack
page read and write
934E000
stack
page read and write
3013F000
stack
page read and write
4E63E000
stack
page read and write
5497F000
stack
page read and write
378BF000
stack
page read and write
7A1DE000
stack
page read and write
13AE000
stack
page read and write
73E4F000
stack
page read and write
5890000
heap
page read and write
2CA7E000
stack
page read and write
2183E000
stack
page read and write
1E63E000
stack
page read and write
A52000
heap
page read and write
2B13F000
stack
page read and write
192BF000
stack
page read and write
10D7E000
stack
page read and write
7799F000
stack
page read and write
3233E000
stack
page read and write
5AFE000
stack
page read and write
28D7F000
stack
page read and write
7869F000
stack
page read and write
E59E000
stack
page read and write
40D1000
trusted library allocation
page read and write
7364E000
stack
page read and write
141FE000
stack
page read and write
17F1000
trusted library allocation
page read and write
56F3E000
stack
page read and write
704AD000
unkown
page read and write
3F2BF000
stack
page read and write
46F3F000
stack
page read and write
F60E000
stack
page read and write
4D3F000
stack
page read and write
28EBF000
stack
page read and write
7C5DF000
stack
page read and write
7D01E000
stack
page read and write
5FBF000
stack
page read and write
CCCE000
stack
page read and write
7859F000
stack
page read and write
1900000
heap
page read and write
53C6000
heap
page read and write
7B0DE000
stack
page read and write
139A000
trusted library allocation
page execute and read and write
3FF7E000
stack
page read and write
2093E000
stack
page read and write
4D5FE000
stack
page read and write
63B7F000
stack
page read and write
15F0000
trusted library allocation
page read and write
3A07E000
stack
page read and write
5A9D000
stack
page read and write
3717E000
stack
page read and write
5DD3E000
stack
page read and write
1B87E000
stack
page read and write
1C73F000
stack
page read and write
CE0000
heap
page readonly
7829F000
stack
page read and write
70CE000
stack
page read and write
5FC3F000
stack
page read and write
F7FE000
stack
page read and write
2BEFF000
stack
page read and write
3B1BF000
stack
page read and write
69D6E000
stack
page read and write
5D2FF000
stack
page read and write
2E30000
heap
page read and write
7054E000
stack
page read and write
27C3E000
stack
page read and write
379FF000
stack
page read and write
369BF000
stack
page read and write
7AF9E000
stack
page read and write
2557E000
stack
page read and write
7A31E000
stack
page read and write
151E000
heap
page read and write
50E3E000
stack
page read and write
2477F000
stack
page read and write
770CE000
stack
page read and write
763F000
stack
page read and write
603BF000
stack
page read and write
5380000
heap
page read and write
54AFE000
stack
page read and write
10BFF000
stack
page read and write
690EF000
stack
page read and write
4287F000
stack
page read and write
CA4E000
stack
page read and write
7AB9F000
stack
page read and write
3803F000
stack
page read and write
9FE000
stack
page read and write
6E3FF000
stack
page read and write
4D9BE000
stack
page read and write
7158E000
stack
page read and write
2F80000
heap
page read and write
602BE000
stack
page read and write
4913E000
stack
page read and write
7C75E000
stack
page read and write
624FF000
stack
page read and write
8F4F000
stack
page read and write
467BF000
stack
page read and write
7F03E000
stack
page read and write
3030000
heap
page read and write
507BF000
stack
page read and write
ECDD000
stack
page read and write
44F7E000
stack
page read and write
990000
heap
page read and write
901F000
heap
page read and write
1D2BE000
stack
page read and write
4C6BF000
stack
page read and write
4D0BF000
stack
page read and write
54E2000
trusted library allocation
page read and write
55B3E000
stack
page read and write
19CBF000
stack
page read and write
4047E000
stack
page read and write
2A7FE000
stack
page read and write
921000
heap
page read and write
201BE000
stack
page read and write
424BF000
stack
page read and write
344FE000
stack
page read and write
114FE000
stack
page read and write
5937E000
stack
page read and write
5603E000
stack
page read and write
9C3000
heap
page read and write
669FE000
stack
page read and write
4F77F000
stack
page read and write
F3C000
stack
page read and write
45DA7000
unkown
page read and write
2D93F000
stack
page read and write
547E000
stack
page read and write
13A0000
heap
page read and write
36EFE000
stack
page read and write
55D7F000
stack
page read and write
160E000
stack
page read and write
1552000
heap
page read and write
4ADBF000
stack
page read and write
6F5FE000
stack
page read and write
471FE000
stack
page read and write
AC6E000
stack
page read and write
1C63E000
stack
page read and write
3117F000
stack
page read and write
314F000
stack
page read and write
BB0F000
stack
page read and write
3E7BE000
stack
page read and write
7154F000
stack
page read and write
70491000
unkown
page execute read
58A7F000
stack
page read and write
1380000
trusted library allocation
page read and write
5DBBF000
stack
page read and write
178BF000
stack
page read and write
6113E000
stack
page read and write
3F17F000
stack
page read and write
5E87E000
stack
page read and write
476FE000
stack
page read and write
57A3F000
stack
page read and write
330FE000
stack
page read and write
6CCEE000
stack
page read and write
DC0000
trusted library allocation
page read and write
1777F000
stack
page read and write
79E000
system
page execute and read and write
2887F000
stack
page read and write
15E4000
trusted library allocation
page read and write
764BE000
stack
page read and write
E3B155C000
stack
page read and write
32BFE000
stack
page read and write
B5E000
stack
page read and write
34DBE000
stack
page read and write
64FBE000
stack
page read and write
673BF000
stack
page read and write
15AFE000
stack
page read and write
944F000
stack
page read and write
EF80000
heap
page read and write
7E55E000
stack
page read and write
217FF000
stack
page read and write
F13C000
stack
page read and write
61C3F000
stack
page read and write
A3E000
heap
page read and write
30D0000
heap
page read and write
1364000
heap
page read and write
7F870000
trusted library allocation
page execute and read and write
6946F000
stack
page read and write
6EA7E000
stack
page read and write
49BE000
stack
page read and write
7180E000
stack
page read and write
5C1BE000
stack
page read and write
6CA6E000
stack
page read and write
53E7E000
stack
page read and write
990000
heap
page read and write
2A2BF000
stack
page read and write
33EBE000
stack
page read and write
114BF000
stack
page read and write
7360F000
stack
page read and write
E50000
heap
page read and write
645BE000
stack
page read and write
1F13F000
stack
page read and write
ECF000
stack
page read and write
5330000
trusted library allocation
page execute and read and write
4353E000
stack
page read and write
58E0000
trusted library allocation
page read and write
7506E000
stack
page read and write
6D2EF000
stack
page read and write
242BE000
stack
page read and write
2B53E000
stack
page read and write
78B5E000
stack
page read and write
308D000
trusted library allocation
page read and write
78F0000
trusted library allocation
page read and write
5AD7F000
stack
page read and write
521FF000
stack
page read and write
742E000
stack
page read and write
B38F000
stack
page read and write
DC5000
trusted library allocation
page read and write
489BE000
stack
page read and write
A88E000
stack
page read and write
7422E000
stack
page read and write
4FFE000
stack
page read and write
11AFF000
stack
page read and write
2BC7F000
stack
page read and write
5BDD000
stack
page read and write
D6CE000
stack
page read and write
72D4F000
stack
page read and write
525FE000
stack
page read and write
3B43F000
stack
page read and write
A26000
heap
page read and write
15EBE000
stack
page read and write
6FF1F000
stack
page read and write
1EEFE000
stack
page read and write
4757F000
stack
page read and write
E90000
heap
page read and write
5AA0000
heap
page read and write
6AEEE000
stack
page read and write
13B0000
heap
page read and write
65C3E000
stack
page read and write
11C0000
heap
page read and write
43EFF000
stack
page read and write
4C40000
trusted library allocation
page read and write
5200000
heap
page read and write
5807F000
stack
page read and write
46CFE000
stack
page read and write
6A8AE000
stack
page read and write
704A6000
unkown
page readonly
1D4FF000
unkown
page read and write
6A5EF000
stack
page read and write
746BF000
stack
page read and write
7819F000
stack
page read and write
6F43F000
stack
page read and write
2F60000
trusted library allocation
page execute and read and write
A62000
heap
page read and write
58ABE000
stack
page read and write
12F3E000
stack
page read and write
2E73E000
stack
page read and write
688FF000
stack
page read and write
355F000
stack
page read and write
DE0F000
stack
page read and write
8D0E000
stack
page read and write
58E3F000
stack
page read and write
5247F000
stack
page read and write
7905E000
stack
page read and write
69EAE000
stack
page read and write
20BBE000
stack
page read and write
7E05E000
stack
page read and write
1740000
heap
page execute and read and write
1E27E000
stack
page read and write
1853E000
stack
page read and write
2C6BE000
stack
page read and write
3EEFF000
stack
page read and write
3473F000
stack
page read and write
531E000
stack
page read and write
46FF000
stack
page read and write
4D60000
heap
page read and write
65FFE000
stack
page read and write
3AA7E000
stack
page read and write
68FBE000
stack
page read and write
4ADE000
stack
page read and write
818F000
stack
page read and write
5067F000
stack
page read and write
368BE000
stack
page read and write
712CF000
stack
page read and write
5DCFF000
stack
page read and write
55BF000
stack
page read and write
4E13E000
stack
page read and write
637BF000
stack
page read and write
6FF000
stack
page read and write
13E3E000
stack
page read and write
1807E000
stack
page read and write
EE8E000
stack
page read and write
E35E000
stack
page read and write
1673F000
stack
page read and write
4A03E000
stack
page read and write
4B43E000
stack
page read and write
3DC7E000
stack
page read and write
5BC7F000
stack
page read and write
45D71000
unkown
page read and write
860000
heap
page read and write
358BF000
stack
page read and write
6E57E000
stack
page read and write
48EA000
trusted library allocation
page read and write
140BE000
stack
page read and write
4540000
heap
page read and write
2053F000
stack
page read and write
21F7F000
stack
page read and write
AD6E000
stack
page read and write
13A7E000
stack
page read and write
F24E000
stack
page read and write
530FF000
stack
page read and write
830000
heap
page read and write
BDF000
stack
page read and write
1D13F000
stack
page read and write
2F3BE000
stack
page read and write
755DE000
stack
page read and write
D90F000
stack
page read and write
2FC7E000
stack
page read and write
6DA6F000
stack
page read and write
400BE000
stack
page read and write
99D000
heap
page read and write
11A8000
heap
page read and write
7E95E000
stack
page read and write
3CFFE000
stack
page read and write
56B3F000
stack
page read and write
2CDFF000
stack
page read and write
DB0000
heap
page read and write
30BB000
heap
page read and write
1173F000
stack
page read and write
72ECE000
stack
page read and write
17B3F000
stack
page read and write
58BBF000
stack
page read and write
410BF000
stack
page read and write
65E7F000
stack
page read and write
446BE000
stack
page read and write
2C43E000
stack
page read and write
1396000
trusted library allocation
page execute and read and write
7BD1F000
stack
page read and write
45D50000
unkown
page read and write
8B0000
trusted library allocation
page read and write
303BF000
stack
page read and write
5BDBF000
stack
page read and write
6DAAE000
stack
page read and write
844E000
stack
page read and write
6740000
trusted library allocation
page read and write
E20000
heap
page read and write
682FE000
stack
page read and write
4363F000
stack
page read and write
6AC2F000
stack
page read and write
22BD0A48000
heap
page read and write
9D4E000
stack
page read and write
48C3E000
stack
page read and write
7965F000
stack
page read and write
54EBE000
stack
page read and write
3F3FF000
stack
page read and write
FC0000
heap
page read and write
1713F000
stack
page read and write
389FF000
stack
page read and write
6E53F000
stack
page read and write
2567F000
stack
page read and write
761E000
stack
page read and write
15BFF000
stack
page read and write
2DF7F000
stack
page read and write
23C3F000
stack
page read and write
78FE000
stack
page read and write
4CBFE000
stack
page read and write
5563E000
stack
page read and write
FB0E000
stack
page read and write
456FE000
stack
page read and write
183FE000
stack
page read and write
D2CF000
stack
page read and write
2363E000
stack
page read and write
7E01F000
stack
page read and write
388FF000
stack
page read and write
6B0000
system
page execute and read and write
4F5E000
stack
page read and write
28DBE000
stack
page read and write
3663E000
stack
page read and write
2733F000
stack
page read and write
2C7FE000
stack
page read and write
4D87E000
stack
page read and write
558BE000
stack
page read and write
442BF000
stack
page read and write
14F0000
heap
page read and write
704A6000
unkown
page readonly
3613E000
stack
page read and write
AD8E000
stack
page read and write
3D4BF000
stack
page read and write
694AE000
stack
page read and write
4C30000
trusted library allocation
page execute and read and write
26E7E000
stack
page read and write
7A4F000
stack
page read and write
3623F000
stack
page read and write
415BF000
stack
page read and write
2FAFF000
stack
page read and write
FA0000
heap
page read and write
4367E000
stack
page read and write
5662000
trusted library allocation
page read and write
30B7E000
stack
page read and write
8DA000
trusted library allocation
page execute and read and write
3427E000
stack
page read and write
493BE000
stack
page read and write
56F0000
trusted library allocation
page execute and read and write
FC4E000
stack
page read and write
E10000
heap
page read and write
5AEBF000
stack
page read and write
8CBE000
stack
page read and write
4D83F000
stack
page read and write
70491000
unkown
page execute read
76E0000
trusted library allocation
page read and write
There are 4054 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0