IOC Report
21Installer.exe

loading gif

Files

File Path
Type
Category
Malicious
21Installer.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\IJJJKEGHJKFH\CGIEGH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IJJJKEGHJKFH\CGIEGH-shm
data
dropped
C:\ProgramData\IJJJKEGHJKFH\DHIECG
ASCII text, with very long lines (1808), with CRLF line terminators
modified
C:\ProgramData\IJJJKEGHJKFH\GCGIDG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\IJJJKEGHJKFH\GHIDGD
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IJJJKEGHJKFH\GHIDGD-shm
data
dropped
C:\ProgramData\IJJJKEGHJKFH\HIEHDA
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IJJJKEGHJKFH\HIIIEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IJJJKEGHJKFH\IDHDGDHJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IJJJKEGHJKFH\IDHIEG
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IJJJKEGHJKFH\JKJDAEBFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\267d2442-0189-4294-8353-855a7233a628.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\45bd8d4c-08c8-4116-9272-b5954df24146.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9fc1f571-1d1d-4cb9-8be4-7d5dc8721074.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6741C818-1820.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6741C818-1E68.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF34bc0.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF34ce8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF34d85.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF34da4.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\b95f3fe0-4e17-4f46-b73a-647ba97631a4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\db98a2f2-bcc5-4e11-834b-f8d91d15e8f4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GJ1F663Z\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 11:18:23 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 11:18:23 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 08:59:33 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 11:18:23 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 11:18:23 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 11:18:23 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 99
ASCII text, with very long lines (797)
downloaded
\Device\Mup\user-PC\PIPE\samr
GLS_BINARY_LSB_FIRST
dropped
There are 35 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\21Installer.exe
"C:\Users\user\Desktop\21Installer.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 --field-trial-handle=2308,i,15671598904166093008,5674781057614970825,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2716 --field-trial-handle=2572,i,10991174585156042928,11769504150118535434,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=2012,i,13731098201840928805,11778138876439723996,262144 /prefetch:3
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
http://anglebug.com/8215O
unknown
https://duckduckgo.com/ac/?q=
unknown
https://google-ohttp-relay-join.fastly-edge.com/.
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://chrome.google.com/webstoreIZWHZRVE=
unknown
https://google-ohttp-relay-join.fastly-edge.com/1
unknown
https://github.com/zloirock/core-js
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://google-ohttp-relay-join.fastly-edge.com/6
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://issuetracker.google.com/253522366forceWaitForSubmissionToCompleteForQueryResult
unknown
http://anglebug.com/5371O
unknown
https://anglebug.com/7382
unknown
https://google-ohttp-relay-join.fastly-edge.com/4
unknown
https://google-ohttp-relay-join.fastly-edge.com/;
unknown
https://issuetracker.google.com/284462263
unknown
http://anglebug.com/48367
unknown
https://google-ohttp-relay-join.fastly-edge.com/?
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://anglebug.com/5055J
unknown
http://postneo.com/icbm/iam.us-gov.amazonaws.comidna:
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
https://t.me/fu4chmo
149.154.167.99
http://polymer.github.io/AUTHORS.txt
unknown
https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg
unknown
https://docs.google.com/document/:
unknown
http://anglebug.com/4836;
unknown
http://anglebug.com/6929_
unknown
http://search.yahoo.com/mrss/ilnpv6
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://anglebug.com/7489A
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://anglebug.com/6876?
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700
unknown
https://google-ohttp-relay-join.fastly-edge.com/O
unknown
https://docs.google.com/presentation/ogl
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://t.me/fu4chmor08etMozilla/5.0
unknown
https://docs.google.com/document/installwebapp?usp=chrome_defaultnjb(
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
https://google-ohttp-relay-join.fastly-edge.com/U
unknown
http://anglebug.com/6248
unknown
https://drive.google.com/?lfhs=2ation.Result
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://anglebug.com/7320-
unknown
https://google-ohttp-relay-join.fastly-edge.com/X
unknown
http://anglebug.com/6929
unknown
https://%s.amazonaws.com/%s/%shttps://image.tmdb.org/t/p/w45https://image.tmdb.org/t/p/w92icmp
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta
unknown
http://anglebug.com/6048=
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://google-ohttp-relay-join.fastly-edge.com/e
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://docs.ntfy.sh/publish/#action-buttons
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
http://anglebug.com/8229L
unknown
http://anglebug.com/4551D
unknown
https://chrome.google.com/webstore
unknown
http://anglebug.com/6439/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://issuetracker.google.com/161903006
unknown
https://chrome.google.com/webstore?hl=en2
unknown
https://www.ecosia.org/newtab/
unknown
https://www.youtube.com/
unknown
http://freshmeat.net/rss/fm/http://schema.org/extensionshttp://search.yahoo.com/mrsshttp://www.geors
unknown
https://anglebug.com/7308Y
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3584.
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/4836&
unknown
http://anglebug.com/5375
unknown
https://ogs.goog
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.htmllt
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://www.youtube.com/?feature=ytcaogl
unknown
https://clients4.google.com/chrome-sync
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
exp0ns.sbs
49.13.32.95
malicious
t.me
149.154.167.99
www.google.com
142.250.181.68
s-part-0035.t-0009.t-msedge.net
13.107.246.63

IPs

IP
Domain
Country
Malicious
192.168.2.10
unknown
unknown
malicious
49.13.32.95
exp0ns.sbs
Germany
malicious
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
149.154.167.99
t.me
United Kingdom
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
327D000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
23C013B8000
trusted library allocation
page read and write
C6757FB000
stack
page read and write
23C00380000
trusted library allocation
page read and write
B4800294000
trusted library allocation
page read and write
23C00F2C000
trusted library allocation
page read and write
23C00FD4000
trusted library allocation
page read and write
1611000
unkown
page execute read
345B000
heap
page read and write
1538A000
direct allocation
page read and write
15750000
direct allocation
page read and write
156D0000
direct allocation
page read and write
151000201000
trusted library allocation
page read and write
23C01840000
trusted library allocation
page read and write
13150000
remote allocation
page read and write
22A203F0000
trusted library allocation
page read and write
C6187FC000
stack
page read and write
15800000
direct allocation
page read and write
29F000380000
trusted library allocation
page read and write
3FA42000
heap
page read and write
3322000
heap
page read and write
33A8000
heap
page read and write
6EC8006AC000
trusted library allocation
page read and write
26CB637E000
heap
page read and write
34F1000
heap
page read and write
29F0003BC000
trusted library allocation
page read and write
1510003BC000
trusted library allocation
page read and write
15680000
direct allocation
page read and write
26CB68DF000
heap
page read and write
23C00344000
trusted library allocation
page read and write
150F0000
direct allocation
page read and write
23C0150C000
trusted library allocation
page read and write
C676FFE000
unkown
page readonly
15330000
direct allocation
page read and write
156E0000
direct allocation
page read and write
3351000
heap
page read and write
23C002F0000
trusted library allocation
page read and write
22A20530000
heap
page read and write
15850000
direct allocation
page read and write
23C01D88000
trusted library allocation
page read and write
156E0000
direct allocation
page read and write
23C001E0000
trusted library allocation
page read and write
23C00834000
trusted library allocation
page read and write
3465000
heap
page read and write
6EC800830000
trusted library allocation
page read and write
152A0000
direct allocation
page read and write
331E000
heap
page read and write
22A2042B000
heap
page read and write
154A0000
direct allocation
page read and write
23C0183C000
trusted library allocation
page read and write
23C006D0000
trusted library allocation
page read and write
3EE000264000
trusted library allocation
page read and write
29F00039C000
trusted library allocation
page read and write
1DEC00316000
direct allocation
page read and write
151000104000
trusted library allocation
page read and write
15540000
direct allocation
page read and write
6EC800874000
trusted library allocation
page read and write
23C8002EC000
direct allocation
page read and write
23C00BDC000
trusted library allocation
page read and write
15120000
direct allocation
page read and write
DA579FE000
stack
page read and write
6EC8002FC000
trusted library allocation
page read and write
15690000
direct allocation
page read and write
23C00D88000
trusted library allocation
page read and write
15360000
direct allocation
page read and write
33AF000
heap
page read and write
151A0000
direct allocation
page read and write
23C01970000
trusted library allocation
page read and write
23C002A8000
trusted library allocation
page read and write
23C00344000
trusted library allocation
page read and write
23C004E0000
trusted library allocation
page read and write
C61CFFE000
unkown
page readonly
23C01DD8000
trusted library allocation
page read and write
22A2238A000
heap
page read and write
23C00984000
trusted library allocation
page read and write
15600000
direct allocation
page read and write
DA5A1FE000
unkown
page readonly
23C01CB8000
trusted library allocation
page read and write
23C01AB4000
trusted library allocation
page read and write
15510000
direct allocation
page read and write
23C01DA8000
trusted library allocation
page read and write
15136000
direct allocation
page read and write
335F000
heap
page read and write
15510000
direct allocation
page read and write
23C002A4000
trusted library allocation
page read and write
DA739FE000
stack
page read and write
DA6C1FE000
unkown
page readonly
157D0000
direct allocation
page read and write
1DEC00284000
direct allocation
page read and write
B4800230000
trusted library allocation
page read and write
33AF000
heap
page read and write
6EC8007C0000
trusted library allocation
page read and write
3287000
heap
page read and write
23C001F8000
trusted library allocation
page read and write
3287000
heap
page read and write
DA589FE000
stack
page read and write
C677FFE000
unkown
page readonly
23C00EDC000
trusted library allocation
page read and write
14DBC000
direct allocation
page read and write
151D0000
direct allocation
page read and write
1519C000
direct allocation
page read and write
23C01264000
trusted library allocation
page read and write
6EC800964000
trusted library allocation
page read and write
26CBCDF3000
trusted library section
page read and write
23C01A98000
trusted library allocation
page read and write
C60CFFE000
unkown
page readonly
641000
remote allocation
page execute and read and write
23C015A8000
trusted library allocation
page read and write
23C00F34000
trusted library allocation
page read and write
150E0000
direct allocation
page read and write
15100028C000
trusted library allocation
page read and write
15170000
direct allocation
page read and write
3369000
heap
page read and write
15198000
direct allocation
page read and write
23C00350000
trusted library allocation
page read and write
653000
remote allocation
page execute and read and write
15650000
direct allocation
page read and write
29F000230000
trusted library allocation
page read and write
23C00CCC000
trusted library allocation
page read and write
23C00230000
trusted library allocation
page read and write
157F6000
direct allocation
page read and write
6EC8008C4000
trusted library allocation
page read and write
C606FFE000
unkown
page readonly
15250000
direct allocation
page read and write
337B000
heap
page read and write
B4800278000
trusted library allocation
page read and write
156B0000
direct allocation
page read and write
26CBD210000
trusted library section
page read and write
DA761FE000
unkown
page readonly
26CB6382000
heap
page read and write
DA6B1FE000
unkown
page readonly
23C0134C000
trusted library allocation
page read and write
15830000
direct allocation
page read and write
26CB8AA0000
trusted library allocation
page read and write
23C01AC8000
trusted library allocation
page read and write
15172000
direct allocation
page read and write
23C018EC000
trusted library allocation
page read and write
342E000
heap
page read and write
151000440000
trusted library allocation
page read and write
6CC50000
unkown
page readonly
6EC8007C4000
trusted library allocation
page read and write
23C0126C000
trusted library allocation
page read and write
23C009CC000
trusted library allocation
page read and write
23C014CD000
trusted library allocation
page read and write
23C01050000
trusted library allocation
page read and write
152C0000
direct allocation
page read and write
29F00032C000
trusted library allocation
page read and write
29F000360000
trusted library allocation
page read and write
14E18000
direct allocation
page read and write
23C0197C000
trusted library allocation
page read and write
23C00A48000
trusted library allocation
page read and write
23C004D4000
trusted library allocation
page read and write
6EC800238000
trusted library allocation
page read and write
15B86000
heap
page read and write
1BD00000
trusted library allocation
page read and write
15520000
direct allocation
page read and write
23C018D8000
trusted library allocation
page read and write
23C00FD4000
trusted library allocation
page read and write
6EC800884000
trusted library allocation
page read and write
23C00304000
trusted library allocation
page read and write
1490C000
direct allocation
page read and write
26CBCF8E000
trusted library section
page read and write
23C01028000
trusted library allocation
page read and write
C6127FD000
stack
page read and write
33B9000
heap
page read and write
23C00D7C000
trusted library allocation
page read and write
2F80000
heap
page read and write
33A8000
heap
page read and write
23C00FD4000
trusted library allocation
page read and write
23C01D50000
trusted library allocation
page read and write
6EC800201000
trusted library allocation
page read and write
15080000
direct allocation
page read and write
15382000
direct allocation
page read and write
13150000
remote allocation
page read and write
29F000210000
trusted library allocation
page read and write
C601FFE000
unkown
page readonly
15570000
direct allocation
page read and write
B4800235000
trusted library allocation
page read and write
23C013AC000
trusted library allocation
page read and write
15100005F000
trusted library allocation
page read and write
6EC8006AC000
trusted library allocation
page read and write
151A0000
direct allocation
page read and write
3468000
heap
page read and write
C11000
unkown
page execute read
23C0120C000
trusted library allocation
page read and write
155A0000
direct allocation
page read and write
97E000
stack
page read and write
6EC80060C000
trusted library allocation
page read and write
29F00031C000
trusted library allocation
page read and write
1BB2F000
direct allocation
page readonly
23C00C7C000
trusted library allocation
page read and write
23C0160C000
trusted library allocation
page read and write
23C01D14000
trusted library allocation
page read and write
23C01938000
trusted library allocation
page read and write
23C01D90000
trusted library allocation
page read and write
23C00934000
trusted library allocation
page read and write
14DFC000
direct allocation
page read and write
156C0000
direct allocation
page read and write
23C01864000
trusted library allocation
page read and write
6EC8008E8000
trusted library allocation
page read and write
26CB638A000
heap
page read and write
26CBC4A7000
unclassified section
page read and write
15740000
direct allocation
page read and write
151000330000
trusted library allocation
page read and write
23C0080C000
trusted library allocation
page read and write
151000260000
trusted library allocation
page read and write
157B0000
trusted library allocation
page read and write
152E0000
direct allocation
page read and write
151000228000
trusted library allocation
page read and write
22A2049F000
heap
page read and write
6EC8008B4000
trusted library allocation
page read and write
6EC800974000
trusted library allocation
page read and write
23C01401000
trusted library allocation
page read and write
23C00380000
trusted library allocation
page read and write
150C0000
direct allocation
page read and write
23C00D69000
trusted library allocation
page read and write
3376000
heap
page read and write
151000068000
trusted library allocation
page read and write
DA619FE000
stack
page read and write
23C010A4000
trusted library allocation
page read and write
3EE0002F0000
trusted library allocation
page read and write
23C01335000
trusted library allocation
page read and write
14DD2000
direct allocation
page read and write
23C01810000
trusted library allocation
page read and write
26CB30F5000
heap
page read and write
15100016C000
trusted library allocation
page read and write
DA759FC000
stack
page read and write
14990000
direct allocation
page read and write
B48002F0000
trusted library allocation
page read and write
3FA46000
heap
page read and write
26CB6384000
heap
page read and write
155A0000
direct allocation
page read and write
109CD000
stack
page read and write
6EC80025C000
trusted library allocation
page read and write
23C00F28000
trusted library allocation
page read and write
15100034C000
trusted library allocation
page read and write
22A2052B000
heap
page read and write
DA711FE000
unkown
page readonly
14DCE000
direct allocation
page read and write
23C01AB0000
trusted library allocation
page read and write
23C002A4000
trusted library allocation
page read and write
15718000
direct allocation
page read and write
23C80020C000
direct allocation
page read and write
23C00350000
trusted library allocation
page read and write
22A223C2000
heap
page read and write
15110000
direct allocation
page read and write
33E0000
heap
page read and write
15830000
direct allocation
page read and write
14D00000
direct allocation
page read and write
15200000
direct allocation
page read and write
22A203D0000
heap
page read and write
26CBC480000
heap
page read and write
14DDE000
direct allocation
page read and write
15860000
direct allocation
page read and write
15740000
direct allocation
page read and write
23C00B50000
trusted library allocation
page read and write
23C00760000
trusted library allocation
page read and write
23C01E01000
trusted library allocation
page read and write
23C016A4000
trusted library allocation
page read and write
15650000
direct allocation
page read and write
23C0111C000
trusted library allocation
page read and write
C608FFE000
unkown
page readonly
3310000
heap
page read and write
1510002C8000
trusted library allocation
page read and write
29F00020C000
trusted library allocation
page read and write
23C00304000
trusted library allocation
page read and write
23C00344000
trusted library allocation
page read and write
23C000E0000
trusted library allocation
page read and write
23C800215000
direct allocation
page read and write
23C0135D000
trusted library allocation
page read and write
15280000
direct allocation
page read and write
158B8000
direct allocation
page read and write
C675FFE000
unkown
page readonly
157D0000
direct allocation
page read and write
23C00D9C000
trusted library allocation
page read and write
23C800260000
direct allocation
page read and write
6EC8002C4000
trusted library allocation
page read and write
23C00B00000
trusted library allocation
page read and write
23C01528000
trusted library allocation
page read and write
155AA000
direct allocation
page read and write
26CB2DD0000
trusted library allocation
page read and write
23C00350000
trusted library allocation
page read and write
22A20400000
heap
page read and write
26CB68DF000
heap
page read and write
155FA000
direct allocation
page read and write
23C0111C000
trusted library allocation
page read and write
152A4000
direct allocation
page read and write
23C017F0000
trusted library allocation
page read and write
DA729FE000
stack
page read and write
32F5000
heap
page read and write
26CB637E000
heap
page read and write
C619FFE000
unkown
page readonly
151000268000
trusted library allocation
page read and write
23C01098000
trusted library allocation
page read and write
29F00040C000
trusted library allocation
page read and write
23C00454000
trusted library allocation
page read and write
15320000
direct allocation
page read and write
23C01C30000
trusted library allocation
page read and write
23C013B8000
trusted library allocation
page read and write
14D8C000
direct allocation
page read and write
23C0027C000
trusted library allocation
page read and write
23C01358000
trusted library allocation
page read and write
6EC800904000
trusted library allocation
page read and write
15870000
direct allocation
page read and write
23C01834000
trusted library allocation
page read and write
3344000
heap
page read and write
23C00ED0000
trusted library allocation
page read and write
6EC800898000
trusted library allocation
page read and write
14906000
direct allocation
page read and write
C6777FE000
stack
page read and write
23C00EF0000
trusted library allocation
page read and write
156A0000
direct allocation
page read and write
23C0111C000
trusted library allocation
page read and write
22A221D0000
trusted library section
page readonly
39A33000
heap
page read and write
338D000
heap
page read and write
6EC8007E4000
trusted library allocation
page read and write
23C01028000
trusted library allocation
page read and write
3376000
heap
page read and write
B48002B8000
trusted library allocation
page read and write
152C0000
direct allocation
page read and write
22A22328000
heap
page read and write
23C0035C000
trusted library allocation
page read and write
23C00350000
trusted library allocation
page read and write
32F5000
heap
page read and write
15100030C000
trusted library allocation
page read and write
15660000
direct allocation
page read and write
151000190000
trusted library allocation
page read and write
23C01EDC000
trusted library allocation
page read and write
151F0000
direct allocation
page read and write
332B000
heap
page read and write
23C00C0C000
trusted library allocation
page read and write
23C0164C000
trusted library allocation
page read and write
14F64000
direct allocation
page read and write
1DEC00260000
direct allocation
page read and write
B48002A0000
trusted library allocation
page read and write
23C01868000
trusted library allocation
page read and write
15370000
direct allocation
page read and write
15360000
direct allocation
page read and write
23C0033C000
trusted library allocation
page read and write
23C00A5C000
trusted library allocation
page read and write
23C00234000
trusted library allocation
page read and write
14DD8000
direct allocation
page read and write
23C800210000
direct allocation
page read and write
23C00F18000
trusted library allocation
page read and write
23C01270000
trusted library allocation
page read and write
15260000
direct allocation
page read and write
23C01536000
trusted library allocation
page read and write
23C00FD4000
trusted library allocation
page read and write
333F000
heap
page read and write
29F0002F4000
trusted library allocation
page read and write
23C0033C000
trusted library allocation
page read and write
3385000
heap
page read and write
23C800294000
direct allocation
page read and write
15670000
direct allocation
page read and write
6EC800430000
trusted library allocation
page read and write
29F000320000
trusted library allocation
page read and write
152D0000
direct allocation
page read and write
23C01E80000
trusted library allocation
page read and write
23C01768000
trusted library allocation
page read and write
14DEE000
direct allocation
page read and write
1DEC002AC000
direct allocation
page read and write
15620000
direct allocation
page read and write
6EC800790000
trusted library allocation
page read and write
23C00304000
trusted library allocation
page read and write
C6157FD000
stack
page read and write
32EA000
heap
page read and write
23C003B7000
trusted library allocation
page read and write
3473000
heap
page read and write
26CB6888000
heap
page read and write
DA629FE000
stack
page read and write
23C002A4000
trusted library allocation
page read and write
23C019AC000
trusted library allocation
page read and write
C67C7FE000
stack
page read and write
29F000290000
trusted library allocation
page read and write
15140000
direct allocation
page read and write
154B0000
direct allocation
page read and write
15E9C000
direct allocation
page read and write
23C013CE000
trusted library allocation
page read and write
27BE4000
heap
page read and write
15520000
direct allocation
page read and write
3369000
heap
page read and write
15540000
direct allocation
page read and write
15746000
direct allocation
page read and write
23C00C80000
trusted library allocation
page read and write
C6707FD000
stack
page read and write
23C01A20000
trusted library allocation
page read and write
23C0133A000
trusted library allocation
page read and write
1510E000
direct allocation
page read and write
155F0000
direct allocation
page read and write
1510003D0000
trusted library allocation
page read and write
15100006A000
trusted library allocation
page read and write
23C01FA8000
trusted library allocation
page read and write
3344000
heap
page read and write
334B000
heap
page read and write
C673FFE000
unkown
page readonly
6CDEF000
unkown
page readonly
32EB000
heap
page read and write
26CB6379000
heap
page read and write
23C01300000
trusted library allocation
page read and write
3EE0002BC000
trusted library allocation
page read and write
23C01C0C000
trusted library allocation
page read and write
C0E000
direct allocation
page read and write
23C01E30000
trusted library allocation
page read and write
3489000
heap
page read and write
23C00E68000
trusted library allocation
page read and write
3396000
heap
page read and write
151E0000
direct allocation
page read and write
32E2000
heap
page read and write
23C00ABC000
trusted library allocation
page read and write
6EC8008A8000
trusted library allocation
page read and write
15340000
direct allocation
page read and write
15146000
direct allocation
page read and write
339D000
heap
page read and write
23C00A98000
trusted library allocation
page read and write
155D0000
direct allocation
page read and write
B48002B4000
trusted library allocation
page read and write
32BE000
heap
page read and write
14DAE000
direct allocation
page read and write
23C0031C000
trusted library allocation
page read and write
158A0000
direct allocation
page read and write
C6747FB000
stack
page read and write
32E4000
heap
page read and write
23C00BA8000
trusted library allocation
page read and write
33C0000
heap
page read and write
B48002E4000
trusted library allocation
page read and write
26CBCD70000
trusted library section
page read and write
155F6000
direct allocation
page read and write
23C0126C000
trusted library allocation
page read and write
3376000
heap
page read and write
23C01D48000
trusted library allocation
page read and write
26CB67B0000
trusted library section
page read and write
15EC0000
direct allocation
page read and write
6EC80078C000
trusted library allocation
page read and write
23C004E8000
trusted library allocation
page read and write
32F5000
heap
page read and write
34F8000
heap
page read and write
DA5D1FE000
unkown
page readonly
23C015A4000
trusted library allocation
page read and write
23C01890000
trusted library allocation
page read and write
6EC80070C000
trusted library allocation
page read and write
23C00A88000
trusted library allocation
page read and write
23C0033C000
trusted library allocation
page read and write
153A0000
direct allocation
page read and write
45B70000
heap
page read and write
23C01380000
trusted library allocation
page read and write
23C800250000
direct allocation
page read and write
26CBC787000
unclassified section
page read and write
15660000
direct allocation
page read and write
6EC800920000
trusted library allocation
page read and write
29F000238000
trusted library allocation
page read and write
B4800220000
trusted library allocation
page read and write
23C00F0D000
trusted library allocation
page read and write
23C013AC000
trusted library allocation
page read and write
6EC800890000
trusted library allocation
page read and write
1530A000
direct allocation
page read and write
3316000
heap
page read and write
22A204AA000
heap
page read and write
23C01425000
trusted library allocation
page read and write
23C002C4000
trusted library allocation
page read and write
23C002A4000
trusted library allocation
page read and write
6EC800960000
trusted library allocation
page read and write
23C01A50000
trusted library allocation
page read and write
15770000
direct allocation
page read and write
155A0000
direct allocation
page read and write
23C00072000
trusted library allocation
page read and write
23C00C68000
trusted library allocation
page read and write
23C00601000
trusted library allocation
page read and write
34E6000
heap
page read and write
26CB6382000
heap
page read and write
23C00E6F000
trusted library allocation
page read and write
3342000
heap
page read and write
22A22314000
heap
page read and write
23C01FA8000
trusted library allocation
page read and write
23C01850000
trusted library allocation
page read and write
3EE000230000
trusted library allocation
page read and write
23C018D4000
trusted library allocation
page read and write
23C001A0000
trusted library allocation
page read and write
341A000
heap
page read and write
C60D7FE000
stack
page read and write
1597F000
heap
page read and write
26CBC4D0000
trusted library section
page read and write
15310000
direct allocation
page read and write
33C0000
heap
page read and write
335F000
heap
page read and write
23C01CB4000
trusted library allocation
page read and write
26CB6383000
heap
page read and write
1589A000
direct allocation
page read and write
151000254000
trusted library allocation
page read and write
15330000
direct allocation
page read and write
23C01358000
trusted library allocation
page read and write
26CB68E6000
heap
page read and write
6EC8007A0000
trusted library allocation
page read and write
22A204BC000
heap
page read and write
23C01C30000
trusted library allocation
page read and write
33B9000
heap
page read and write
156F0000
direct allocation
page read and write
1491A000
direct allocation
page read and write
33B9000
heap
page read and write
3EE0002BC000
trusted library allocation
page read and write
23C01918000
trusted library allocation
page read and write
23C003A0000
trusted library allocation
page read and write
CBC000
stack
page read and write
23C00990000
trusted library allocation
page read and write
3358000
heap
page read and write
3274000
heap
page read and write
23C00D70000
trusted library allocation
page read and write
15100025C000
trusted library allocation
page read and write
33A8000
heap
page read and write
DA6C9FC000
stack
page read and write
23C01C01000
trusted library allocation
page read and write
6EC800980000
trusted library allocation
page read and write
1510002B0000
trusted library allocation
page read and write
22A204B7000
heap
page read and write
C613FFE000
unkown
page readonly
350C000
heap
page read and write
23C0033C000
trusted library allocation
page read and write
26CB2ED7000
heap
page read and write
1510000CC000
trusted library allocation
page read and write
6EC8007E0000
trusted library allocation
page read and write
23C002F3000
trusted library allocation
page read and write
15100045C000
trusted library allocation
page read and write
B48002A8000
trusted library allocation
page read and write
23C01E80000
trusted library allocation
page read and write
10A6F000
stack
page read and write
B48002B4000
trusted library allocation
page read and write
23C01910000
trusted library allocation
page read and write
359A000
heap
page read and write
23C005C4000
trusted library allocation
page read and write
3265000
heap
page read and write
26CBABA6000
heap
page read and write
23C00F4C000
trusted library allocation
page read and write
6EC800418000
trusted library allocation
page read and write
1589C000
direct allocation
page read and write
15300000
direct allocation
page read and write
23C00CDC000
trusted library allocation
page read and write
23C01D9C000
trusted library allocation
page read and write
15840000
direct allocation
page read and write
15540000
direct allocation
page read and write
29F000364000
trusted library allocation
page read and write
15150000
direct allocation
page read and write
15760000
direct allocation
page read and write
23C8002D0000
direct allocation
page read and write
3EE000238000
trusted library allocation
page read and write
15508000
direct allocation
page read and write
22A22351000
heap
page read and write
23C0106C000
trusted library allocation
page read and write
23C002A4000
trusted library allocation
page read and write
23C01A30000
trusted library allocation
page read and write
23C01A4C000
trusted library allocation
page read and write
C6787FE000
stack
page read and write
23C800234000
direct allocation
page read and write
1510002AC000
trusted library allocation
page read and write
3342000
heap
page read and write
23C00DE8000
trusted library allocation
page read and write
33C0000
heap
page read and write
15350000
direct allocation
page read and write
23C01300000
trusted library allocation
page read and write
23C01D74000
trusted library allocation
page read and write
15350000
direct allocation
page read and write
309E000
unkown
page write copy
22A20499000
heap
page read and write
3479000
heap
page read and write
152B0000
direct allocation
page read and write
15710000
direct allocation
page read and write
6EC800601000
trusted library allocation
page read and write
23C01EF0000
trusted library allocation
page read and write
32E2000
heap
page read and write
158C0000
direct allocation
page read and write
15378000
direct allocation
page read and write
23C0157C000
trusted library allocation
page read and write
23C000D0000
trusted library allocation
page read and write
14DC1000
direct allocation
page read and write
23C017AC000
trusted library allocation
page read and write
26CB6383000
heap
page read and write
336F000
heap
page read and write
156F0000
direct allocation
page read and write
23C002A4000
trusted library allocation
page read and write
152E0000
direct allocation
page read and write
1DEC00250000
direct allocation
page read and write
15320000
direct allocation
page read and write
150B0000
direct allocation
page read and write
151C0000
direct allocation
page read and write
15100017C000
trusted library allocation
page read and write
15540000
direct allocation
page read and write
151000248000
trusted library allocation
page read and write
153A0000
direct allocation
page read and write
15290000
direct allocation
page read and write
B48002B4000
trusted library allocation
page read and write
23C019DC000
trusted library allocation
page read and write
23C01778000
trusted library allocation
page read and write
C6077FC000
stack
page read and write
23C01894000
trusted library allocation
page read and write
15100024C000
trusted library allocation
page read and write
23C007B4000
trusted library allocation
page read and write
C612FFE000
unkown
page readonly
33AF000
heap
page read and write
22A223A7000
heap
page read and write
23C00CCC000
trusted library allocation
page read and write
22A22336000
heap
page read and write
22A2A600000
heap
page read and write
6EC8008C8000
trusted library allocation
page read and write
15360000
direct allocation
page read and write
23C01820000
trusted library allocation
page read and write
23C0111C000
trusted library allocation
page read and write
15240000
direct allocation
page read and write
23C01790000
trusted library allocation
page read and write
26CB638F000
heap
page read and write
DA609FE000
stack
page read and write
B48002B4000
trusted library allocation
page read and write
DA701FE000
unkown
page readonly
D50000
heap
page read and write
151000224000
trusted library allocation
page read and write
6EC8008E4000
trusted library allocation
page read and write
23C800201000
direct allocation
page read and write
23C00E18000
trusted library allocation
page read and write
26CB2F15000
heap
page read and write
22A20471000
heap
page read and write
1DEC00234000
direct allocation
page read and write
23C01140000
trusted library allocation
page read and write
26CBCEB2000
trusted library section
page read and write
151000001000
trusted library allocation
page read and write
1B8E0000
direct allocation
page execute and read and write
15260000
direct allocation
page read and write
15580000
direct allocation
page read and write
151FE000
direct allocation
page read and write
333D000
heap
page read and write
23C017F4000
trusted library allocation
page read and write
3EE000288000
trusted library allocation
page read and write
15170000
direct allocation
page read and write
23C0179C000
trusted library allocation
page read and write
15294000
direct allocation
page read and write
15290000
direct allocation
page read and write
15094000
direct allocation
page read and write
3EE00020C000
trusted library allocation
page read and write
157D2000
direct allocation
page read and write
C670FFE000
unkown
page readonly
23C01E20000
trusted library allocation
page read and write
14DB1000
direct allocation
page read and write
26CB2E37000
heap
page read and write
23C006F4000
trusted library allocation
page read and write
3468000
heap
page read and write
23C01C94000
trusted library allocation
page read and write
23C01640000
trusted library allocation
page read and write
14DDE000
direct allocation
page read and write
3433000
heap
page read and write
23C00380000
trusted library allocation
page read and write
23C00EEC000
trusted library allocation
page read and write
23C00E1D000
trusted library allocation
page read and write
23C01928000
trusted library allocation
page read and write
23C006E0000
trusted library allocation
page read and write
15510000
direct allocation
page read and write
152F0000
direct allocation
page read and write
3281000
heap
page read and write
23C01AAC000
trusted library allocation
page read and write
B48002A8000
trusted library allocation
page read and write
C6737F9000
stack
page read and write
151000360000
trusted library allocation
page read and write
23C019C8000
trusted library allocation
page read and write
23C01310000
trusted library allocation
page read and write
1525C000
direct allocation
page read and write
9C0000
heap
page read and write
C6017FC000
stack
page read and write
1510001A8000
trusted library allocation
page read and write
C6047FC000
stack
page read and write
3EE0002B0000
trusted library allocation
page read and write
6EC800840000
trusted library allocation
page read and write
49F000
remote allocation
page execute and read and write
6CE2F000
unkown
page write copy
CEA000
stack
page read and write
22A22213000
heap
page read and write
15380000
direct allocation
page read and write
3EE000220000
trusted library allocation
page read and write
151000298000
trusted library allocation
page read and write
23C0157C000
trusted library allocation
page read and write
6EC8006F4000
trusted library allocation
page read and write
6EC80091C000
trusted library allocation
page read and write
15370000
direct allocation
page read and write
3EE0002A0000
trusted library allocation
page read and write
34C1000
heap
page read and write
23C01A1C000
trusted library allocation
page read and write
23C01DC8000
trusted library allocation
page read and write
C60EFFE000
unkown
page readonly
23C0126C000
trusted library allocation
page read and write
DA571FE000
unkown
page readonly
26CB686B000
heap
page read and write
6EC8002CC000
trusted library allocation
page read and write
23C01BB4000
trusted library allocation
page read and write
23C00D24000
trusted library allocation
page read and write
26CB2DC0000
trusted library allocation
page read and write
23C00344000
trusted library allocation
page read and write
22A22392000
heap
page read and write
23C005D4000
trusted library allocation
page read and write
3EE000248000
trusted library allocation
page read and write
15680000
direct allocation
page read and write
151000084000
trusted library allocation
page read and write
23C00DBC000
trusted library allocation
page read and write
B48002B4000
trusted library allocation
page read and write
26CB2F1C000
heap
page read and write
23C00077000
trusted library allocation
page read and write
15802000
direct allocation
page read and write
E44D000
stack
page read and write
6EC8008F0000
trusted library allocation
page read and write
22A22334000
heap
page read and write
151000108000
trusted library allocation
page read and write
23C0008C000
trusted library allocation
page read and write
6EC8002B0000
trusted library allocation
page read and write
15680000
direct allocation
page read and write
23C0016C000
trusted library allocation
page read and write
155C0000
direct allocation
page read and write
3330000
heap
page read and write
15370000
direct allocation
page read and write
C61A7FD000
stack
page read and write
23C00660000
trusted library allocation
page read and write
14D9C000
direct allocation
page read and write
1BB22000
direct allocation
page read and write
153B0000
direct allocation
page read and write
1DEC002D8000
direct allocation
page read and write
153F0000
direct allocation
page read and write
23C00C7C000
trusted library allocation
page read and write
23C018C0000
trusted library allocation
page read and write
152B0000
direct allocation
page read and write
23C00290000
trusted library allocation
page read and write
151000340000
trusted library allocation
page read and write
15400000
direct allocation
page read and write
2FFA000
heap
page read and write
343E000
heap
page read and write
C6137FE000
stack
page read and write
3207000
heap
page read and write
3302000
heap
page read and write
15960000
heap
page read and write
29F0002B0000
trusted library allocation
page read and write
156A0000
direct allocation
page read and write
22A2A602000
heap
page read and write
15440000
direct allocation
page read and write
DA6F9FE000
stack
page read and write
B48002FC000
trusted library allocation
page read and write
29F000344000
trusted library allocation
page read and write
23C004E0000
trusted library allocation
page read and write
26CBC8C0000
trusted library section
page read and write
15100000C000
trusted library allocation
page read and write
23C00894000
trusted library allocation
page read and write
23C01D20000
trusted library allocation
page read and write
15150000
direct allocation
page read and write
23C01948000
trusted library allocation
page read and write
15730000
direct allocation
page read and write
26CBAB90000
heap
page read and write
23C016B8000
trusted library allocation
page read and write
1510001DC000
trusted library allocation
page read and write
1510004AC000
trusted library allocation
page read and write
1510000F4000
trusted library allocation
page read and write
DA549FE000
stack
page read and write
23C008CC000
trusted library allocation
page read and write
26CB6384000
heap
page read and write
150DE000
direct allocation
page read and write
23C001B4000
trusted library allocation
page read and write
154F0000
direct allocation
page read and write
26CBD440000
trusted library section
page read and write
DA709FE000
stack
page read and write
15160000
direct allocation
page read and write
15600000
direct allocation
page read and write
151000240000
trusted library allocation
page read and write
23C00709000
trusted library allocation
page read and write
15396000
direct allocation
page read and write
15100000
direct allocation
page read and write
152D0000
direct allocation
page read and write
15310000
direct allocation
page read and write
C6037FA000
stack
page read and write
23C00CF8000
trusted library allocation
page read and write
32F1000
heap
page read and write
153A0000
direct allocation
page read and write
15730000
direct allocation
page read and write
26CB6350000
heap
page read and write
6CC3E000
unkown
page read and write
1DEC0021C000
direct allocation
page read and write
15780000
direct allocation
page read and write
23C80024C000
direct allocation
page read and write
14922000
direct allocation
page read and write
1510001CC000
trusted library allocation
page read and write
345B000
heap
page read and write
15880000
direct allocation
page read and write
6EC80039C000
trusted library allocation
page read and write
1DEC002C0000
direct allocation
page read and write
23C005B4000
trusted library allocation
page read and write
15804000
direct allocation
page read and write
DA651FE000
unkown
page readonly
15490000
direct allocation
page read and write
C67B7FA000
stack
page read and write
15450000
direct allocation
page read and write
23C002A4000
trusted library allocation
page read and write
15760000
direct allocation
page read and write
337B000
heap
page read and write
26CB689B000
heap
page read and write
23C01F98000
trusted library allocation
page read and write
336F000
heap
page read and write
23C017A8000
trusted library allocation
page read and write
155B0000
direct allocation
page read and write
BE0000
direct allocation
page read and write
158F0000
direct allocation
page read and write
32FC000
heap
page read and write
1510000B0000
trusted library allocation
page read and write
23C01AA8000
trusted library allocation
page read and write
23C0033C000
trusted library allocation
page read and write
3539000
heap
page read and write
23C00344000
trusted library allocation
page read and write
23C00DB8000
trusted library allocation
page read and write
D55000
heap
page read and write
151000214000
trusted library allocation
page read and write
23C013AC000
trusted library allocation
page read and write
154A0000
direct allocation
page read and write
23C017DC000
trusted library allocation
page read and write
1DEC00210000
direct allocation
page read and write
23C00134000
trusted library allocation
page read and write
C6767FC000
stack
page read and write
6EC800230000
trusted library allocation
page read and write
23C00060000
trusted library allocation
page read and write
10A2E000
stack
page read and write
15690000
direct allocation
page read and write
23C01994000
trusted library allocation
page read and write
32E8000
heap
page read and write
23C01BD0000
trusted library allocation
page read and write
C67D7FE000
stack
page read and write
15530000
direct allocation
page read and write
15100000
direct allocation
page read and write
26CB6360000
heap
page read and write
153E0000
direct allocation
page read and write
15100039C000
trusted library allocation
page read and write
32E8000
heap
page read and write
151000234000
trusted library allocation
page read and write
1510002D4000
trusted library allocation
page read and write
DA689FE000
stack
page read and write
153D0000
direct allocation
page read and write
1BC80000
trusted library allocation
page read and write
DA529FE000
stack
page read and write
DA799FE000
stack
page read and write
23C01CCC000
trusted library allocation
page read and write
23C002A8000
trusted library allocation
page read and write
22A20502000
heap
page read and write
22A2237C000
heap
page read and write
151000340000
trusted library allocation
page read and write
343E000
heap
page read and write
6EC80040C000
trusted library allocation
page read and write
23C01898000
trusted library allocation
page read and write
25C9000
unkown
page readonly
151000250000
trusted library allocation
page read and write
15100040C000
trusted library allocation
page read and write
23C00DC4000
trusted library allocation
page read and write
22A2041C000
heap
page read and write
26CBCDD0000
trusted library section
page read and write
1C60000
unkown
page readonly
23C01690000
trusted library allocation
page read and write
464000
remote allocation
page execute and read and write
3312000
heap
page read and write
23C004B4000
trusted library allocation
page read and write
2FFE000
heap
page read and write
26CB6382000
heap
page read and write
1DEC0031C000
direct allocation
page read and write
151E0000
direct allocation
page read and write
151000220000
trusted library allocation
page read and write
23C01960000
trusted library allocation
page read and write
153C0000
direct allocation
page read and write
23C01BB4000
trusted library allocation
page read and write
6EC8006F4000
trusted library allocation
page read and write
10ABE000
stack
page read and write
23C01CEC000
trusted library allocation
page read and write
15550000
direct allocation
page read and write
26CB2EFE000
heap
page read and write
1BC80000
trusted library allocation
page read and write
3431000
heap
page read and write
6EC800864000
trusted library allocation
page read and write
23C0136C000
trusted library allocation
page read and write
336F000
heap
page read and write
22A2052B000
heap
page read and write
15220000
direct allocation
page read and write
153B0000
direct allocation
page read and write
154C0000
direct allocation
page read and write
23C00ED0000
trusted library allocation
page read and write
23C00370000
trusted library allocation
page read and write
C600FFE000
unkown
page readonly
15290000
direct allocation
page read and write
6EC800878000
trusted library allocation
page read and write
C60BFFE000
unkown
page readonly
15100000
direct allocation
page read and write
157F0000
direct allocation
page read and write
22A20498000
heap
page read and write
23C0097B000
trusted library allocation
page read and write
23C800220000
direct allocation
page read and write
15180000
direct allocation
page read and write
23C00CA0000
trusted library allocation
page read and write
152D0000
direct allocation
page read and write
26CB637E000
heap
page read and write
1498F000
direct allocation
page read and write
3EE0002C0000
trusted library allocation
page read and write
1524E000
direct allocation
page read and write
157B4000
heap
page read and write
154B0000
direct allocation
page read and write
23C01B04000
trusted library allocation
page read and write
14CEE000
direct allocation
page read and write
23C01EA8000
trusted library allocation
page read and write
337B000
heap
page read and write
C67FFFE000
unkown
page readonly
157E0000
direct allocation
page read and write
22A29210000
trusted library allocation
page read and write
23C00228000
trusted library allocation
page read and write
22A20413000
heap
page read and write
23C0180C000
trusted library allocation
page read and write
153B6000
direct allocation
page read and write
15100019C000
trusted library allocation
page read and write
3369000
heap
page read and write
1BB8E000
heap
page read and write
C607FFE000
unkown
page readonly
15EA2000
direct allocation
page read and write
C611FFE000
unkown
page readonly
23C01D80000
trusted library allocation
page read and write
1DEC00294000
direct allocation
page read and write
23C013C4000
trusted library allocation
page read and write
151000078000
trusted library allocation
page read and write
3FA38000
heap
page read and write
15710000
direct allocation
page read and write
23C00304000
trusted library allocation
page read and write
32E8000
heap
page read and write
C66F7FE000
stack
page read and write
23C00A5C000
trusted library allocation
page read and write
22A2230A000
heap
page read and write
23C01E8C000
trusted library allocation
page read and write
C10000
unkown
page readonly
3396000
heap
page read and write
3302000
heap
page read and write
15385000
direct allocation
page read and write
23C01BB4000
trusted library allocation
page read and write
29F0002D0000
trusted library allocation
page read and write
23C013EB000
trusted library allocation
page read and write
26CBCCC7000
unclassified section
page read and write
1510003E0000
trusted library allocation
page read and write
14DA2000
direct allocation
page read and write
22A204AA000
heap
page read and write
15620000
direct allocation
page read and write
3369000
heap
page read and write
3481000
heap
page read and write
29F000300000
trusted library allocation
page read and write
C67F7FC000
stack
page read and write
23C00310000
trusted library allocation
page read and write
C66C7FF000
stack
page read and write
1511E000
direct allocation
page read and write
157EC000
direct allocation
page read and write
34CA000
heap
page read and write
15190000
direct allocation
page read and write
344E000
heap
page read and write
22A22385000
heap
page read and write
23C01C54000
trusted library allocation
page read and write
26CBD450000
trusted library section
page read and write
15350000
direct allocation
page read and write
23C00F74000
trusted library allocation
page read and write
26CB637E000
heap
page read and write
23C01028000
trusted library allocation
page read and write
15400000
direct allocation
page read and write
152A0000
direct allocation
page read and write
B48002A8000
trusted library allocation
page read and write
DA771FE000
unkown
page readonly
23C000A8000
trusted library allocation
page read and write
C6167FD000
stack
page read and write
23C0166C000
trusted library allocation
page read and write
23C01128000
trusted library allocation
page read and write
154B0000
direct allocation
page read and write
6EC8007BC000
trusted library allocation
page read and write
23C013A4000
trusted library allocation
page read and write
23C0033C000
trusted library allocation
page read and write
15180000
direct allocation
page read and write
23C00CCC000
trusted library allocation
page read and write
3492000
heap
page read and write
23C0104C000
trusted library allocation
page read and write
7C7F000
stack
page read and write
15380000
direct allocation
page read and write
23C00330000
trusted library allocation
page read and write
C67CFFE000
unkown
page readonly
346D000
heap
page read and write
23C00304000
trusted library allocation
page read and write
23C00D10000
trusted library allocation
page read and write
2FC4000
unkown
page write copy
23C01CF0000
trusted library allocation
page read and write
1510001B8000
trusted library allocation
page read and write
23C00300000
trusted library allocation
page read and write
23C00220000
trusted library allocation
page read and write
23C014AC000
trusted library allocation
page read and write
2DB51000
heap
page read and write
151D0000
direct allocation
page read and write
23C00ED0000
trusted library allocation
page read and write
151000054000
trusted library allocation
page read and write
23C01634000
trusted library allocation
page read and write
23C00CCC000
trusted library allocation
page read and write
23C00FA8000
trusted library allocation
page read and write
33A8000
heap
page read and write
6EC800918000
trusted library allocation
page read and write
23C800284000
direct allocation
page read and write
3EE0002C0000
trusted library allocation
page read and write
3EE0002A0000
trusted library allocation
page read and write
23C01958000
trusted library allocation
page read and write
26CB68EF000
heap
page read and write
23C00A1C000
trusted library allocation
page read and write
23C00C1C000
trusted library allocation
page read and write
22A2049F000
heap
page read and write
15680000
direct allocation
page read and write
23C01D28000
trusted library allocation
page read and write
338D000
heap
page read and write
C66A7EF000
stack
page read and write
15300000
direct allocation
page read and write
1512E000
direct allocation
page read and write
32F8000
heap
page read and write
CFC000
stack
page read and write
1318E000
stack
page read and write
23C00AE4000
trusted library allocation
page read and write
DA5D9FD000
stack
page read and write
23C017CC000
trusted library allocation
page read and write
23C01A88000
trusted library allocation
page read and write
23C00CDC000
trusted library allocation
page read and write
15460000
direct allocation
page read and write
DA591FE000
unkown
page readonly
23C01DA4000
trusted library allocation
page read and write
26CB637E000
heap
page read and write
23C013AC000
trusted library allocation
page read and write
15010000
direct allocation
page read and write
26CB2EB0000
heap
page read and write
48D000
remote allocation
page execute and read and write
23C00CDC000
trusted library allocation
page read and write
154D0000
direct allocation
page read and write
23C00304000
trusted library allocation
page read and write
15570000
direct allocation
page read and write
29F00027C000
trusted library allocation
page read and write
23C019A8000
trusted library allocation
page read and write
151000290000
trusted library allocation
page read and write
154F2000
direct allocation
page read and write
15660000
direct allocation
page read and write
1510001D8000
trusted library allocation
page read and write
15480000
direct allocation
page read and write
3281000
heap
page read and write
23C01364000
trusted library allocation
page read and write
23C01D6C000
trusted library allocation
page read and write
15430000
direct allocation
page read and write
BF0E000
stack
page read and write
23C00554000
trusted library allocation
page read and write
23C001F4000
trusted library allocation
page read and write
23C01F68000
trusted library allocation
page read and write
15610000
direct allocation
page read and write
23C800280000
direct allocation
page read and write
3EE0002F4000
trusted library allocation
page read and write
23C001D4000
trusted library allocation
page read and write
155D0000
direct allocation
page read and write
342E000
heap
page read and write
156B0000
direct allocation
page read and write
15100020C000
trusted library allocation
page read and write
4A2000
remote allocation
page execute and read and write
15312000
direct allocation
page read and write
15500000
direct allocation
page read and write
151D0000
direct allocation
page read and write
C602FFE000
unkown
page readonly
23C014AC000
trusted library allocation
page read and write
15350000
direct allocation
page read and write
26CB6382000
heap
page read and write
1DEC0030A000
direct allocation
page read and write
153E0000
direct allocation
page read and write
23C01F1C000
trusted library allocation
page read and write
26CB68A8000
heap
page read and write
23C01A74000
trusted library allocation
page read and write
23C0006C000
trusted library allocation
page read and write
23C00EDC000
trusted library allocation
page read and write
14D9C000
direct allocation
page read and write
23C015CC000
trusted library allocation
page read and write
23C00CF8000
trusted library allocation
page read and write
23C0106C000
trusted library allocation
page read and write
3EE000294000
trusted library allocation
page read and write
3EE0002BC000
trusted library allocation
page read and write
6EC80084C000
trusted library allocation
page read and write
23C019CC000
trusted library allocation
page read and write
23C00EC8000
trusted library allocation
page read and write
23C007A8000
trusted library allocation
page read and write
3265000
heap
page read and write
151000210000
trusted library allocation
page read and write
29F00031C000
trusted library allocation
page read and write
23C0061C000
trusted library allocation
page read and write
152B0000
direct allocation
page read and write
14924000
direct allocation
page read and write
15300000
direct allocation
page read and write
23C00725000
trusted library allocation
page read and write
23C00304000
trusted library allocation
page read and write
3251000
heap
page read and write
23C01914000
trusted library allocation
page read and write
15600000
direct allocation
page read and write
23C01BD0000
trusted library allocation
page read and write
15116000
direct allocation
page read and write
23C0040C000
trusted library allocation
page read and write
23C001C4000
trusted library allocation
page read and write
23C01362000
trusted library allocation
page read and write
29F000358000
trusted library allocation
page read and write
34D7000
heap
page read and write
23C0022C000
trusted library allocation
page read and write
23C00030000
trusted library allocation
page read and write
152F0000
direct allocation
page read and write
334B000
heap
page read and write
156D0000
direct allocation
page read and write
23C0151C000
trusted library allocation
page read and write
23C00EA8000
trusted library allocation
page read and write
155E0000
direct allocation
page read and write
980000
direct allocation
page read and write
14F6E000
direct allocation
page read and write
23C00E6C000
trusted library allocation
page read and write
23C01396000
trusted library allocation
page read and write
DA581FE000
unkown
page readonly
15460000
direct allocation
page read and write
C6177FA000
stack
page read and write
23C00B60000
trusted library allocation
page read and write
23C001EC000
trusted library allocation
page read and write
C60A7FC000
stack
page read and write
23C0118C000
trusted library allocation
page read and write
23C00454000
trusted library allocation
page read and write
3EE0002C0000
trusted library allocation
page read and write
C618FFE000
unkown
page readonly
C6717F8000
stack
page read and write
15160000
direct allocation
page read and write
23C01DD4000
trusted library allocation
page read and write
3349000
heap
page read and write
23C01934000
trusted library allocation
page read and write
26CBA2F0000
trusted library section
page read and write
15340000
direct allocation
page read and write
14D80000
direct allocation
page read and write
23C0118C000
trusted library allocation
page read and write
23C01900000
trusted library allocation
page read and write
22A20527000
heap
page read and write
1510001F4000
trusted library allocation
page read and write
23C002A4000
trusted library allocation
page read and write
3FA40000
heap
page read and write
3477000
heap
page read and write
15182000
direct allocation
page read and write
22A2233A000
heap
page read and write
23C0018C000
trusted library allocation
page read and write
15898000
direct allocation
page read and write
23C01E0C000
trusted library allocation
page read and write
15856000
heap
page read and write
151000120000
trusted library allocation
page read and write
26CBA9E0000
trusted library allocation
page read and write
346A000
heap
page read and write
154F0000
direct allocation
page read and write
33B9000
heap
page read and write
23C01CE4000
trusted library allocation
page read and write
151A5000
direct allocation
page read and write
22A22338000
heap
page read and write
3EE0002C8000
trusted library allocation
page read and write
6EC8002EE000
trusted library allocation
page read and write
23C01768000
trusted library allocation
page read and write
23C00BEC000
trusted library allocation
page read and write
6EC8002B8000
trusted library allocation
page read and write
152F0000
direct allocation
page read and write
3EE0002B0000
trusted library allocation
page read and write
15440000
direct allocation
page read and write
15280000
direct allocation
page read and write
339D000
heap
page read and write
324B000
heap
page read and write
23C0157C000
trusted library allocation
page read and write
D70000
heap
page read and write
26CB638A000
heap
page read and write
154E2000
direct allocation
page read and write
26CB2F15000
heap
page read and write
15810000
direct allocation
page read and write
1510001E0000
trusted library allocation
page read and write
260B000
unkown
page readonly
23C01780000
trusted library allocation
page read and write
23C00E50000
trusted library allocation
page read and write
23C013DC000
trusted library allocation
page read and write
3EE0002F8000
trusted library allocation
page read and write
2FF3000
heap
page read and write
23C00CF8000
trusted library allocation
page read and write
26CB4BD3000
heap
page read and write
26CB2F06000
heap
page read and write
C60B7FE000
stack
page read and write
B4800260000
trusted library allocation
page read and write
23C01118000
trusted library allocation
page read and write
22A203B0000
heap
page read and write
23C008F0000
trusted library allocation
page read and write
26CBCEBD000
trusted library section
page read and write
153F0000
direct allocation
page read and write
154C0000
direct allocation
page read and write
3376000
heap
page read and write
23C0007C000
trusted library allocation
page read and write
26CB638A000
heap
page read and write
15470000
direct allocation
page read and write
15630000
direct allocation
page read and write
6CC2D000
unkown
page readonly
29F000408000
trusted library allocation
page read and write
DA5E9FC000
stack
page read and write
1BB2D000
direct allocation
page readonly
3349000
heap
page read and write
C67AFFE000
unkown
page readonly
23C001B4000
trusted library allocation
page read and write
32F5000
heap
page read and write
22A204C7000
heap
page read and write
6EC800248000
trusted library allocation
page read and write
32F1000
heap
page read and write
23C01F60000
trusted library allocation
page read and write
C61C7FE000
stack
page read and write
23C015A4000
trusted library allocation
page read and write
23C00C6C000
trusted library allocation
page read and write
3EE0002BC000
trusted library allocation
page read and write
26CB2F11000
heap
page read and write
3376000
heap
page read and write
335F000
heap
page read and write
6EC80020C000
trusted library allocation
page read and write
26CB68EF000
heap
page read and write
29F0003C0000
trusted library allocation
page read and write
23C0195C000
trusted library allocation
page read and write
151000114000
trusted library allocation
page read and write
23C00344000
trusted library allocation
page read and write
C66E7FE000
stack
page read and write
22A223D3000
heap
page read and write
45B7A000
heap
page read and write
23C001B4000
trusted library allocation
page read and write
6EC80079C000
trusted library allocation
page read and write
33A8000
heap
page read and write
150A0000
direct allocation
page read and write
23C0157C000
trusted library allocation
page read and write
23C00CF0000
trusted library allocation
page read and write
AC0000
heap
page read and write
23C019C0000
trusted library allocation
page read and write
327A000
heap
page read and write
3EE0002C0000
trusted library allocation
page read and write
6EC800210000
trusted library allocation
page read and write
23C00670000
trusted library allocation
page read and write
23C01950000
trusted library allocation
page read and write
29F000201000
trusted library allocation
page read and write
15100041C000
trusted library allocation
page read and write
15270000
direct allocation
page read and write
15100026C000
trusted library allocation
page read and write
158F0000
direct allocation
page read and write
23C01CD0000
trusted library allocation
page read and write
23C00344000
trusted library allocation
page read and write
15470000
direct allocation
page read and write
15570000
direct allocation
page read and write
23C01A68000
trusted library allocation
page read and write
1DEC00215000
direct allocation
page read and write
1511C000
direct allocation
page read and write
151000388000
trusted library allocation
page read and write
32F3000
heap
page read and write
15E98000
direct allocation
page read and write
23C01510000
trusted library allocation
page read and write
339D000
heap
page read and write
6EC8002F4000
trusted library allocation
page read and write
23C01A10000
trusted library allocation
page read and write
3329000
heap
page read and write
3396000
heap
page read and write
6CE30000
unkown
page read and write
23C00E24000
trusted library allocation
page read and write
15630000
direct allocation
page read and write
23C018FC000
trusted library allocation
page read and write
23C00454000
trusted library allocation
page read and write
15390000
direct allocation
page read and write
22A22300000
heap
page read and write
3358000
heap
page read and write
15340000
direct allocation
page read and write
3351000
heap
page read and write
23C01341000
trusted library allocation
page read and write
6EC8006D4000
trusted library allocation
page read and write
23C00A34000
trusted library allocation
page read and write
26CBC740000
trusted library section
page read and write
3385000
heap
page read and write
23C01395000
trusted library allocation
page read and write
153B0000
direct allocation
page read and write
1510000BC000
trusted library allocation
page read and write
9DF000
heap
page read and write
B48002A8000
trusted library allocation
page read and write
23C00EFC000
trusted library allocation
page read and write
B48002B4000
trusted library allocation
page read and write
26CBC702000
trusted library section
page read and write
3358000
heap
page read and write
349E000
heap
page read and write
C60FFFE000
unkown
page readonly
23C00C58000
trusted library allocation
page read and write
26CBD1E7000
unclassified section
page read and write
3497000
heap
page read and write
23C01D78000
trusted library allocation
page read and write
1510002E0000
trusted library allocation
page read and write
15376000
direct allocation
page read and write
1510002D4000
trusted library allocation
page read and write
1BC04000
heap
page read and write
3497000
heap
page read and write
3369000
heap
page read and write
22A223D5000
heap
page read and write
23C00304000
trusted library allocation
page read and write
26CB637E000
heap
page read and write
23C01D34000
trusted library allocation
page read and write
C60E7FE000
stack
page read and write
26CB2EBC000
heap
page read and write
23C0118C000
trusted library allocation
page read and write
23C800217000
direct allocation
page read and write
155B0000
direct allocation
page read and write
26CB6382000
heap
page read and write
6EC8002F0000
trusted library allocation
page read and write
154E0000
direct allocation
page read and write
26CB6382000
heap
page read and write
23C014B8000
trusted library allocation
page read and write
151000320000
trusted library allocation
page read and write
155F0000
direct allocation
page read and write
23C01CA4000
trusted library allocation
page read and write
153C0000
direct allocation
page read and write
23C018AC000
trusted library allocation
page read and write
3357000
heap
page read and write
357A000
heap
page read and write
B4800294000
trusted library allocation
page read and write
23C01D4C000
trusted library allocation
page read and write
9C8000
heap
page read and write
C615FFE000
unkown
page readonly
23C01601000
trusted library allocation
page read and write
26CBC6A6000
trusted library section
page read and write
1307F000
heap
page read and write
23C019F0000
trusted library allocation
page read and write
14DBE000
direct allocation
page read and write
23C0111C000
trusted library allocation
page read and write
23C0135F000
trusted library allocation
page read and write
23C00ED0000
trusted library allocation
page read and write
32E8000
heap
page read and write
23C00344000
trusted library allocation
page read and write
345F000
heap
page read and write
1DEC0024C000
direct allocation
page read and write
1BAF8000
direct allocation
page readonly
C616FFE000
unkown
page readonly
23C01824000
trusted library allocation
page read and write
1530D000
direct allocation
page read and write
23C00E44000
trusted library allocation
page read and write
29F000350000
trusted library allocation
page read and write
15110000
direct allocation
page read and write
23C006EA000
trusted library allocation
page read and write
34E6000
heap
page read and write
15370000
direct allocation
page read and write
23C00FB8000
trusted library allocation
page read and write
151B0000
direct allocation
page read and write
15660000
direct allocation
page read and write
23C0017C000
trusted library allocation
page read and write
23C013E4000
trusted library allocation
page read and write
34AA000
heap
page read and write
3385000
heap
page read and write
6EC8008B8000
trusted library allocation
page read and write
23C00DE0000
trusted library allocation
page read and write
DA6F1FE000
unkown
page readonly
23C0177C000
trusted library allocation
page read and write
14DFE000
direct allocation
page read and write
6EC8006C8000
trusted library allocation
page read and write
23C0052F000
trusted library allocation
page read and write
15744000
direct allocation
page read and write
3200000
heap
page read and write
15810000
direct allocation
page read and write
23C0157C000
trusted library allocation
page read and write
23C800270000
direct allocation
page read and write
B4800294000
trusted library allocation
page read and write
23C00350000
trusted library allocation
page read and write
14F60000
direct allocation
page read and write
14F36000
direct allocation
page read and write
23C00D58000
trusted library allocation
page read and write
23C01990000
trusted library allocation
page read and write
6EC800778000
trusted library allocation
page read and write
23C01A18000
trusted library allocation
page read and write
15100040F000
trusted library allocation
page read and write
15700000
direct allocation
page read and write
6EC8006E0000
trusted library allocation
page read and write
153C0000
direct allocation
page read and write
26CB2F04000
heap
page read and write
15100030C000
trusted library allocation
page read and write
C66FFFE000
unkown
page readonly
1BB80000
heap
page read and write
23C0101C000
trusted library allocation
page read and write
15500000
direct allocation
page read and write
23C00B9C000
trusted library allocation
page read and write
988000
direct allocation
page read and write
23C0167B000
trusted library allocation
page read and write
3385000
heap
page read and write
157A0000
direct allocation
page read and write
1510001C4000
trusted library allocation
page read and write
15670000
direct allocation
page read and write
2F2E000
stack
page read and write
155DA000
direct allocation
page read and write
3344000
heap
page read and write
1510002D4000
trusted library allocation
page read and write
23C01A40000
trusted library allocation
page read and write
6EC8006E8000
trusted library allocation
page read and write
15200000
direct allocation
page read and write
15590000
direct allocation
page read and write
34A3000
heap
page read and write
15192000
direct allocation
page read and write
23C01F24000
trusted library allocation
page read and write
23C0138C000
trusted library allocation
page read and write
1510001F8000
trusted library allocation
page read and write
6EC800850000
trusted library allocation
page read and write
3446000
heap
page read and write
34DE000
heap
page read and write
C66D7FE000
stack
page read and write
15610000
direct allocation
page read and write
15160000
direct allocation
page read and write
23C00EDC000
trusted library allocation
page read and write
29F000424000
trusted library allocation
page read and write
C604FFE000
unkown
page readonly
1505C000
direct allocation
page read and write
6EC80087C000
trusted library allocation
page read and write
23C00854000
trusted library allocation
page read and write
15100038C000
trusted library allocation
page read and write
150B4000
direct allocation
page read and write
23C8002A8000
direct allocation
page read and write
15106000
direct allocation
page read and write
32EB000
heap
page read and write
23C0020C000
trusted library allocation
page read and write
148F4000
direct allocation
page read and write
23C800303000
direct allocation
page read and write
3312000
heap
page read and write
15220000
direct allocation
page read and write
23C003B0000
trusted library allocation
page read and write
151D0000
direct allocation
page read and write
23C007E0000
trusted library allocation
page read and write
C6117FE000
stack
page read and write
15302000
direct allocation
page read and write
26CBCDE1000
trusted library section
page read and write
DA599FE000
stack
page read and write
6EC800848000
trusted library allocation
page read and write
23C019D8000
trusted library allocation
page read and write
33E0000
heap
page read and write
23C007D0000
trusted library allocation
page read and write
C610FFE000
unkown
page readonly
3518000
heap
page read and write
22A20513000
heap
page read and write
337B000
heap
page read and write
23C01860000
trusted library allocation
page read and write
3251000
heap
page read and write
23C019EC000
trusted library allocation
page read and write
29F0003C4000
trusted library allocation
page read and write
26CBA5C2000
trusted library allocation
page read and write
3396000
heap
page read and write
15196000
direct allocation
page read and write
1510002EC000
trusted library allocation
page read and write
23C00980000
trusted library allocation
page read and write
15100023C000
trusted library allocation
page read and write
26CB4BD0000
heap
page read and write
23C0100C000
trusted library allocation
page read and write
23C004E0000
trusted library allocation
page read and write
C60DFFE000
unkown
page readonly
22A204E9000
heap
page read and write
6EC800818000
trusted library allocation
page read and write
23C01F04000
trusted library allocation
page read and write
3559000
heap
page read and write
26CB6871000
heap
page read and write
C06000
direct allocation
page read and write
26CBC3F3000
heap
page read and write
1DEC00328000
direct allocation
page read and write
157C0000
direct allocation
page read and write
3489000
heap
page read and write
B4800270000
trusted library allocation
page read and write
333A000
heap
page read and write
32F1000
heap
page read and write
1510002EC000
trusted library allocation
page read and write
151B0000
direct allocation
page read and write
150A4000
direct allocation
page read and write
C60AFFE000
unkown
page readonly
22A204A4000
heap
page read and write
23C0078C000
trusted library allocation
page read and write
15640000
direct allocation
page read and write
151000258000
trusted library allocation
page read and write
3265000
heap
page read and write
1510002C8000
trusted library allocation
page read and write
155C0000
direct allocation
page read and write
C674FFE000
unkown
page readonly
3EE000235000
trusted library allocation
page read and write
153E0000
direct allocation
page read and write
23C01D64000
trusted library allocation
page read and write
23C00CDC000
trusted library allocation
page read and write
34AA000
heap
page read and write
C66EFFE000
unkown
page readonly
C66BFFE000
unkown
page readonly
23C0069C000
trusted library allocation
page read and write
1BAED000
direct allocation
page execute read
15732000
direct allocation
page read and write
DA649FE000
stack
page read and write
15170000
direct allocation
page read and write
23C016B8000
trusted library allocation
page read and write
3420000
heap
page read and write
6EC8006BC000
trusted library allocation
page read and write
26CBABCC000
heap
page read and write
23C013CD000
trusted library allocation
page read and write
23C01634000
trusted library allocation
page read and write
15320000
direct allocation
page read and write
23C00A5C000
trusted library allocation
page read and write
33F8000
heap
page read and write
3313000
heap
page read and write
23C01870000
trusted library allocation
page read and write
B4800210000
trusted library allocation
page read and write
33C0000
heap
page read and write
23C019BC000
trusted library allocation
page read and write
23C0169C000
trusted library allocation
page read and write
14918000
direct allocation
page read and write
15100031C000
trusted library allocation
page read and write
26CB2D60000
heap
page readonly
152C0000
direct allocation
page read and write
22A22320000
heap
page read and write
155C0000
direct allocation
page read and write
1510002A0000
trusted library allocation
page read and write
26CB2C80000
heap
page read and write
32EA000
heap
page read and write
CE8000
stack
page read and write
32F8000
heap
page read and write
23C00210000
trusted library allocation
page read and write
3437000
heap
page read and write
15550000
direct allocation
page read and write
23C01060000
trusted library allocation
page read and write
26CB2DA0000
heap
page read and write
158B0000
direct allocation
page read and write
B48002A8000
trusted library allocation
page read and write
23C0080C000
trusted library allocation
page read and write
1510001EC000
trusted library allocation
page read and write
23C01998000
trusted library allocation
page read and write
26CB2D70000
heap
page read and write
158E0000
direct allocation
page read and write
3312000
heap
page read and write
23C01CE8000
trusted library allocation
page read and write
15790000
direct allocation
page read and write
23C0000C000
trusted library allocation
page read and write
15780000
direct allocation
page read and write
23C01D54000
trusted library allocation
page read and write
6EC800424000
trusted library allocation
page read and write
23C01D08000
trusted library allocation
page read and write
1588C000
direct allocation
page read and write
C6797FE000
stack
page read and write
158D0000
direct allocation
page read and write
1515E000
direct allocation
page read and write
1BAEF000
direct allocation
page readonly
15820000
direct allocation
page read and write
DA639FE000
stack
page read and write
6CE2E000
unkown
page read and write
151000238000
trusted library allocation
page read and write
3281000
heap
page read and write
23C002D0000
trusted library allocation
page read and write
6EC80085C000
trusted library allocation
page read and write
1511E000
direct allocation
page read and write
23C01580000
trusted library allocation
page read and write
1DEC00311000
direct allocation
page read and write
15190000
direct allocation
page read and write
29F000310000
trusted library allocation
page read and write
23C00FA4000
trusted library allocation
page read and write
23C00A5C000
trusted library allocation
page read and write
15E9E000
direct allocation
page read and write
6EC800220000
trusted library allocation
page read and write
26CB2E00000
trusted library section
page readonly
22A20530000
heap
page read and write
26CB2F04000
heap
page read and write
23C00214000
trusted library allocation
page read and write
23C01104000
trusted library allocation
page read and write
6EC8008D8000
trusted library allocation
page read and write
3314000
heap
page read and write
151000288000
trusted library allocation
page read and write
156B8000
direct allocation
page read and write
6EC800948000
trusted library allocation
page read and write
23C0053C000
trusted library allocation
page read and write
22A22330000
heap
page read and write
21C7E000
heap
page read and write
155CA000
direct allocation
page read and write
23C00304000
trusted library allocation
page read and write
C671FFE000
unkown
page readonly
3385000
heap
page read and write
156A0000
direct allocation
page read and write
B48002A8000
trusted library allocation
page read and write
1DEC00230000
direct allocation
page read and write
23C0040C000
trusted library allocation
page read and write
8FD000
stack
page read and write
22A22202000
heap
page read and write
1DEC00270000
direct allocation
page read and write
1510002B0000
trusted library allocation
page read and write
23C01794000
trusted library allocation
page read and write
29F000404000
trusted library allocation
page read and write
33AC8000
heap
page read and write
151000040000
trusted library allocation
page read and write
151000054000
trusted library allocation
page read and write
BECF000
stack
page read and write
23C002A4000
trusted library allocation
page read and write
15100029C000
trusted library allocation
page read and write
155BA000
direct allocation
page read and write
23C01884000
trusted library allocation
page read and write
155B0000
direct allocation
page read and write
C6147FE000
stack
page read and write
23C0140C000
trusted library allocation
page read and write
23C0021C000
trusted library allocation
page read and write
23C00E90000
trusted library allocation
page read and write
23C01300000
trusted library allocation
page read and write
151000388000
trusted library allocation
page read and write
23C00118000
trusted library allocation
page read and write
34B1000
heap
page read and write
151000020000
trusted library allocation
page read and write
337B000
heap
page read and write
33B9000
heap
page read and write
1589C000
direct allocation
page read and write
34E3000
heap
page read and write
15490000
direct allocation
page read and write
1DEC00303000
direct allocation
page read and write
23C01AC4000
trusted library allocation
page read and write
23C006F0000
trusted library allocation
page read and write
3EE0002BC000
trusted library allocation
page read and write
3EE0002B0000
trusted library allocation
page read and write
23C01CB0000
trusted library allocation
page read and write
1537A000
direct allocation
page read and write
3274000
heap
page read and write
1BB86000
heap
page read and write
29F000401000
trusted library allocation
page read and write
15850000
direct allocation
page read and write
23C01C7C000
trusted library allocation
page read and write
23C0033C000
trusted library allocation
page read and write
6EC8002DC000
trusted library allocation
page read and write
334C000
heap
page read and write
6EC800408000
trusted library allocation
page read and write
23C01D68000
trusted library allocation
page read and write
6EC80071C000
trusted library allocation
page read and write
15605000
direct allocation
page read and write
6EC800404000
trusted library allocation
page read and write
59A000
remote allocation
page execute and read and write
151A0000
direct allocation
page read and write
3FA4A000
heap
page read and write
15410000
direct allocation
page read and write
C60F7FB000
stack
page read and write
34A6000
heap
page read and write
155E0000
direct allocation
page read and write
23C01640000
trusted library allocation
page read and write
335F000
heap
page read and write
23C000F0000
trusted library allocation
page read and write
DA519FE000
unkown
page read and write
C6067FD000
stack
page read and write
15750000
direct allocation
page read and write
1510002A8000
trusted library allocation
page read and write
15640000
direct allocation
page read and write
23C00730000
trusted library allocation
page read and write
23C01A01000
trusted library allocation
page read and write
23C01801000
trusted library allocation
page read and write
15150000
direct allocation
page read and write
1DEC002D0000
direct allocation
page read and write
151C0000
direct allocation
page read and write
152D0000
direct allocation
page read and write
23C018E8000
trusted library allocation
page read and write
3EE0002A0000
trusted library allocation
page read and write
336F000
heap
page read and write
23C00710000
trusted library allocation
page read and write
13040000
heap
page read and write
C6007FE000
stack
page read and write
23C00880000
trusted library allocation
page read and write
15610000
direct allocation
page read and write
23C01201000
trusted library allocation
page read and write
1510002E0000
trusted library allocation
page read and write
154D0000
direct allocation
page read and write
26CB638A000
heap
page read and write
151000264000
trusted library allocation
page read and write
23C002C4000
trusted library allocation
page read and write
15100022C000
trusted library allocation
page read and write
1DEC002D8000
direct allocation
page read and write
C10000
unkown
page readonly
3303000
heap
page read and write
4A8000
remote allocation
page execute and read and write
15560000
direct allocation
page read and write
26CB68F2000
heap
page read and write
14A04000
direct allocation
page read and write
15280000
direct allocation
page read and write
23C0052C000
trusted library allocation
page read and write
23C0060C000
trusted library allocation
page read and write
23C01110000
trusted library allocation
page read and write
15110000
direct allocation
page read and write
23C00364000
trusted library allocation
page read and write
E50000
heap
page readonly
23C00CCC000
trusted library allocation
page read and write
26CB2EF9000
heap
page read and write
1580C000
direct allocation
page read and write
22A20558000
heap
page read and write
33F8000
heap
page read and write
1BD0D000
heap
page read and write
23C008AC000
trusted library allocation
page read and write
150F0000
direct allocation
page read and write
335F000
heap
page read and write
15840000
direct allocation
page read and write
23C018A4000
trusted library allocation
page read and write
C11000
unkown
page execute read
23C00E2C000
trusted library allocation
page read and write
23C01C80000
trusted library allocation
page read and write
23C00CCC000
trusted library allocation
page read and write
1DEC00220000
direct allocation
page read and write
B4800210000
trusted library allocation
page read and write
23C01180000
trusted library allocation
page read and write
23C008C0000
trusted library allocation
page read and write
3EE000274000
trusted library allocation
page read and write
26CBAB80000
heap
page read and write
1510002BC000
trusted library allocation
page read and write
26CBC70D000
trusted library section
page read and write
34CA000
heap
page read and write
23C00350000
trusted library allocation
page read and write
15870000
direct allocation
page read and write
29F000430000
trusted library allocation
page read and write
15284000
direct allocation
page read and write
26CB638B000
heap
page read and write
152E0000
direct allocation
page read and write
15320000
direct allocation
page read and write
15580000
direct allocation
page read and write
23C01C78000
trusted library allocation
page read and write
29F000250000
trusted library allocation
page read and write
15570000
direct allocation
page read and write
29F0003AC000
trusted library allocation
page read and write
23C0192C000
trusted library allocation
page read and write
15560000
direct allocation
page read and write
DA641FE000
unkown
page readonly
22A2049B000
heap
page read and write
1DEC002A8000
direct allocation
page read and write
23C00714000
trusted library allocation
page read and write
23C00DA8000
trusted library allocation
page read and write
29F000338000
trusted library allocation
page read and write
23C01874000
trusted library allocation
page read and write
151F0000
direct allocation
page read and write
3465000
heap
page read and write
23C008E8000
trusted library allocation
page read and write
23C01CF4000
trusted library allocation
page read and write
22A22332000
heap
page read and write
3301000
heap
page read and write
3EE000270000
trusted library allocation
page read and write
1DEC002D0000
direct allocation
page read and write
6EC800894000
trusted library allocation
page read and write
23C01580000
trusted library allocation
page read and write
156E0000
heap
page read and write
15376000
direct allocation
page read and write
DA551FE000
unkown
page readonly
15746000
direct allocation
page read and write
23C00C80000
trusted library allocation
page read and write
3EE0002A0000
trusted library allocation
page read and write
3274000
heap
page read and write
23C00CDC000
trusted library allocation
page read and write
22A2234B000
heap
page read and write
23C01A64000
trusted library allocation
page read and write
15EB0000
direct allocation
page read and write
29F000284000
trusted library allocation
page read and write
23C01828000
trusted library allocation
page read and write
15170000
direct allocation
page read and write
23C00330000
trusted library allocation
page read and write
15760000
direct allocation
page read and write
6EC800250000
trusted library allocation
page read and write
23C00801000
trusted library allocation
page read and write
26CB2EDC000
heap
page read and write
22A204A4000
heap
page read and write
6EC80080C000
trusted library allocation
page read and write
3369000
heap
page read and write
151000230000
trusted library allocation
page read and write
33F8000
heap
page read and write
15630000
direct allocation
page read and write
14900000
direct allocation
page read and write
C67DFFE000
unkown
page readonly
23C00CCC000
trusted library allocation
page read and write
C60C7FE000
stack
page read and write
23C01AA4000
trusted library allocation
page read and write
29F00025C000
trusted library allocation
page read and write
22A20360000
heap
page read and write
15000000
direct allocation
page read and write
23C0000C000
trusted library allocation
page read and write
CF5000
stack
page read and write
23C01DC4000
trusted library allocation
page read and write
23C00D2C000
trusted library allocation
page read and write
155A0000
direct allocation
page read and write
15ED0000
direct allocation
page read and write
23C01466000
trusted library allocation
page read and write
153F0000
direct allocation
page read and write
23C004E3000
trusted library allocation
page read and write
23C00BC4000
trusted library allocation
page read and write
26CB30F0000
heap
page read and write
12FFD000
stack
page read and write
B4800248000
trusted library allocation
page read and write
23C0063C000
trusted library allocation
page read and write
156F0000
direct allocation
page read and write
34C1000
heap
page read and write
29F000374000
trusted library allocation
page read and write
23C00F60000
trusted library allocation
page read and write
23C001DC000
trusted library allocation
page read and write
23C0106C000
trusted library allocation
page read and write
B48002F8000
trusted library allocation
page read and write
22A20430000
heap
page read and write
15600000
direct allocation
page read and write
26CB6881000
heap
page read and write
15330000
direct allocation
page read and write
14EF0000
direct allocation
page read and write
23C00824000
trusted library allocation
page read and write
156A0000
direct allocation
page read and write
23C01D04000
trusted library allocation
page read and write
3301000
heap
page read and write
14DB6000
direct allocation
page read and write
15310000
direct allocation
page read and write
6EC8006F0000
trusted library allocation
page read and write
32F5000
heap
page read and write
330B000
heap
page read and write
C672FFE000
unkown
page readonly
33AF000
heap
page read and write
15210000
direct allocation
page read and write
152FA000
direct allocation
page read and write
339D000
heap
page read and write
23C00F7C000
trusted library allocation
page read and write
152EA000
direct allocation
page read and write
3357000
heap
page read and write
23C015A4000
trusted library allocation
page read and write
23C01C98000
trusted library allocation
page read and write
C6197FE000
stack
page read and write
23C01CD4000
trusted library allocation
page read and write
151AA000
direct allocation
page read and write
C614FFE000
unkown
page readonly
22A20444000
heap
page read and write
23C00CF8000
trusted library allocation
page read and write
DA6E1FE000
unkown
page readonly
29F000308000
trusted library allocation
page read and write
C6107FC000
stack
page read and write
3446000
heap
page read and write
29F000248000
trusted library allocation
page read and write
3437000
heap
page read and write
23C00128000
trusted library allocation
page read and write
AC7000
heap
page read and write
26CB638A000
heap
page read and write
23C01D38000
trusted library allocation
page read and write
23C01AE8000
trusted library allocation
page read and write
22A22390000
heap
page read and write
151000294000
trusted library allocation
page read and write
15B84000
heap
page read and write
153D0000
direct allocation
page read and write
151000398000
trusted library allocation
page read and write
26CB6384000
heap
page read and write
3369000
heap
page read and write
DA731FE000
unkown
page readonly
34B1000
heap
page read and write
29F000390000
trusted library allocation
page read and write
23C005EC000
trusted library allocation
page read and write
3EE000260000
trusted library allocation
page read and write
23C00ED0000
trusted library allocation
page read and write
23C00E01000
trusted library allocation
page read and write
3477000
heap
page read and write
33E0000
heap
page read and write
23C00350000
trusted library allocation
page read and write
23C01DA0000
trusted library allocation
page read and write
1510002F8000
trusted library allocation
page read and write
23C01838000
trusted library allocation
page read and write
6EC800868000
trusted library allocation
page read and write
15420000
direct allocation
page read and write
23C0114C000
trusted library allocation
page read and write
15E88000
direct allocation
page read and write
150D0000
direct allocation
page read and write
1577C000
stack
page read and write
3EE0002C0000
trusted library allocation
page read and write
26CBCD50000
trusted library section
page read and write
155E0000
direct allocation
page read and write
151E0000
direct allocation
page read and write
156B0000
direct allocation
page read and write
15720000
direct allocation
page read and write
15420000
direct allocation
page read and write
14D4A000
direct allocation
page read and write
34D2000
heap
page read and write
345F000
heap
page read and write
154D0000
direct allocation
page read and write
23C0081D000
trusted library allocation
page read and write
23C0014C000
trusted library allocation
page read and write
1515A000
direct allocation
page read and write
156E0000
direct allocation
page read and write
23C002F7000
trusted library allocation
page read and write
23C018CC000
trusted library allocation
page read and write
1510001E8000
trusted library allocation
page read and write
156D0000
direct allocation
page read and write
151A2000
direct allocation
page read and write
14914000
direct allocation
page read and write
34EA000
heap
page read and write
23C01001000
trusted library allocation
page read and write
151000240000
trusted library allocation
page read and write
155C0000
direct allocation
page read and write
22A2231D000
heap
page read and write
14E06000
direct allocation
page read and write
22A204AC000
heap
page read and write
33AF000
heap
page read and write
23C01D24000
trusted library allocation
page read and write
B48002A8000
trusted library allocation
page read and write
33A8000
heap
page read and write
15250000
direct allocation
page read and write
23C005A4000
trusted library allocation
page read and write
23C00380000
trusted library allocation
page read and write
23C009C0000
trusted library allocation
page read and write
23C00194000
trusted library allocation
page read and write
C617FFE000
unkown
page readonly
26CB6383000
heap
page read and write
15770000
direct allocation
page read and write
C67EFFE000
unkown
page readonly
3EE0002E4000
trusted library allocation
page read and write
E9E000
stack
page read and write
23C01A84000
trusted library allocation
page read and write
23C0196C000
trusted library allocation
page read and write
29F000288000
trusted library allocation
page read and write
32F1000
heap
page read and write
1DEC00217000
direct allocation
page read and write
15570000
direct allocation
page read and write
C6097FB000
stack
page read and write
3284000
heap
page read and write
15126000
direct allocation
page read and write
23C017E8000
trusted library allocation
page read and write
15708000
direct allocation
page read and write
23C01EB8000
trusted library allocation
page read and write
22A2239A000
heap
page read and write
3396000
heap
page read and write
23C00A13000
trusted library allocation
page read and write
156C8000
direct allocation
page read and write
34F1000
heap
page read and write
23C00E0C000
trusted library allocation
page read and write
23C010B4000
trusted library allocation
page read and write
339D000
heap
page read and write
6EC800401000
trusted library allocation
page read and write
22A22384000
heap
page read and write
15800000
direct allocation
page read and write
158F0000
trusted library allocation
page read and write
23C8002E4000
direct allocation
page read and write
15670000
direct allocation
page read and write
23C00454000
trusted library allocation
page read and write
23C01DDC000
trusted library allocation
page read and write
DA769FE000
stack
page read and write
23C0111C000
trusted library allocation
page read and write
23C00B9C000
trusted library allocation
page read and write
C01000
direct allocation
page read and write
29F0002F1000
trusted library allocation
page read and write
23C01980000
trusted library allocation
page read and write
C6057FC000
stack
page read and write
23C018D0000
trusted library allocation
page read and write
23C00B1C000
trusted library allocation
page read and write
15722000
direct allocation
page read and write
23C01264000
trusted library allocation
page read and write
22A20561000
heap
page read and write
23C00454000
trusted library allocation
page read and write
26CBCDC0000
trusted library section
page read and write
DA749FE000
stack
page read and write
15308000
direct allocation
page read and write
23C01C54000
trusted library allocation
page read and write
DA6B9FD000
stack
page read and write
39BA000
unkown
page write copy
1510003C0000
trusted library allocation
page read and write
26CB6390000
heap
page read and write
26CB6378000
heap
page read and write
23C010A4000
trusted library allocation
page read and write
B4800264000
trusted library allocation
page read and write
15180000
direct allocation
page read and write
DA5B1FE000
unkown
page readonly
23C00CDC000
trusted library allocation
page read and write
150E0000
direct allocation
page read and write
15110000
direct allocation
page read and write
344E000
heap
page read and write
B48002C8000
trusted library allocation
page read and write
33B9000
heap
page read and write
BF7000
direct allocation
page read and write
23C00401000
trusted library allocation
page read and write
AC5000
heap
page read and write
3436000
heap
page read and write
26CBCF80000
trusted library section
page read and write
3420000
heap
page read and write
DA521FE000
unkown
page readonly
15640000
direct allocation
page read and write
14DAE000
direct allocation
page read and write
15610000
direct allocation
page read and write
3385000
heap
page read and write
1510000E4000
trusted library allocation
page read and write
23C0033C000
trusted library allocation
page read and write
15270000
direct allocation
page read and write
6EC800288000
trusted library allocation
page read and write
26CB2EF7000
heap
page read and write
1BB2A000
direct allocation
page readonly
DA631FE000
unkown
page readonly
26CB684E000
heap
page read and write
B4800274000
trusted library allocation
page read and write
1DEC00280000
direct allocation
page read and write
B4800294000
trusted library allocation
page read and write
DA691FE000
unkown
page readonly
15360000
direct allocation
page read and write
15430000
direct allocation
page read and write
23C00310000
trusted library allocation
page read and write
5E0000
heap
page read and write
26CB2EB8000
heap
page read and write
23C002AE000
trusted library allocation
page read and write
23C01D8C000
trusted library allocation
page read and write
33E0000
heap
page read and write
3302000
heap
page read and write
23C01A48000
trusted library allocation
page read and write
23C01C54000
trusted library allocation
page read and write
15100040C000
trusted library allocation
page read and write
29F000284000
trusted library allocation
page read and write
150D0000
direct allocation
page read and write
23C0150C000
trusted library allocation
page read and write
23C00A01000
trusted library allocation
page read and write
15270000
direct allocation
page read and write
DA509F3000
stack
page read and write
3316000
heap
page read and write
151F0000
direct allocation
page read and write
23C00224000
trusted library allocation
page read and write
151000270000
trusted library allocation
page read and write
22A20390000
heap
page readonly
29F0003A0000
trusted library allocation
page read and write
6CE35000
unkown
page readonly
23C018BC000
trusted library allocation
page read and write
23C01768000
trusted library allocation
page read and write
23C01798000
trusted library allocation
page read and write
23C01098000
trusted library allocation
page read and write
23C80023C000
direct allocation
page read and write
DA621FE000
unkown
page readonly
15120000
direct allocation
page read and write
151000424000
trusted library allocation
page read and write
23C01A14000
trusted library allocation
page read and write
26CB2F00000
heap
page read and write
154E0000
direct allocation
page read and write
3333000
heap
page read and write
3473000
heap
page read and write
22A2045A000
heap
page read and write
156D8000
direct allocation
page read and write
DA6D9FE000
stack
page read and write
14CCE000
direct allocation
page read and write
22A204A4000
heap
page read and write
26CBCD82000
trusted library section
page read and write
15770000
direct allocation
page read and write
23C01E1C000
trusted library allocation
page read and write
DA741FE000
unkown
page readonly
3281000
heap
page read and write
B48002D8000
trusted library allocation
page read and write
C67BFFE000
unkown
page readonly
6EC80027C000
trusted library allocation
page read and write
23C00328000
trusted library allocation
page read and write
23C001E8000
trusted library allocation
page read and write
32E3000
heap
page read and write
23C014AC000
trusted library allocation
page read and write
29F0002A4000
trusted library allocation
page read and write
15520000
direct allocation
page read and write
339D000
heap
page read and write
23C00CE0000
trusted library allocation
page read and write
23C00F9C000
trusted library allocation
page read and write
34B7000
heap
page read and write
23C00350000
trusted library allocation
page read and write
23C00350000
trusted library allocation
page read and write
33C0000
heap
page read and write
339D000
heap
page read and write
153E0000
direct allocation
page read and write
23C00920000
trusted library allocation
page read and write
23C01104000
trusted library allocation
page read and write
14E14000
direct allocation
page read and write
1492C000
direct allocation
page read and write
23C00040000
trusted library allocation
page read and write
23C00AC3000
trusted library allocation
page read and write
151E0000
direct allocation
page read and write
13150000
remote allocation
page read and write
2FDE000
stack
page read and write
23C00A50000
trusted library allocation
page read and write
29F0003A8000
trusted library allocation
page read and write
15690000
direct allocation
page read and write
23C00350000
trusted library allocation
page read and write
158E0000
direct allocation
page read and write
B4800238000
trusted library allocation
page read and write
15100044C000
trusted library allocation
page read and write
5F0000
heap
page read and write
23C001AC000
trusted library allocation
page read and write
23C01E10000
trusted library allocation
page read and write
29F000220000
trusted library allocation
page read and write
23C0015C000
trusted library allocation
page read and write
23C003B1000
trusted library allocation
page read and write
23C010D0000
trusted library allocation
page read and write
23C00201000
trusted library allocation
page read and write
151F0000
direct allocation
page read and write
15888000
direct allocation
page read and write
156C0000
direct allocation
page read and write
23C01DCC000
trusted library allocation
page read and write
33C0000
heap
page read and write
14DA4000
direct allocation
page read and write
23C00F34000
trusted library allocation
page read and write
1DEC00318000
direct allocation
page read and write
14DA6000
direct allocation
page read and write
32F5000
heap
page read and write
6EC8007D4000
trusted library allocation
page read and write
15590000
direct allocation
page read and write
1510003A0000
trusted library allocation
page read and write
3376000
heap
page read and write
3508000
heap
page read and write
3EE0002BC000
trusted library allocation
page read and write
15290000
direct allocation
page read and write
151000320000
trusted library allocation
page read and write
336F000
heap
page read and write
23C001D8000
trusted library allocation
page read and write
150EE000
direct allocation
page read and write
26CB2E20000
heap
page read and write
26CB2F0C000
heap
page read and write
349E000
heap
page read and write
C679FFE000
unkown
page readonly
26CB6800000
heap
page read and write
23C00304000
trusted library allocation
page read and write
23C00FD4000
trusted library allocation
page read and write
15550000
direct allocation
page read and write
3357000
heap
page read and write
153A6000
direct allocation
page read and write
B48002B8000
trusted library allocation
page read and write
26CB6384000
heap
page read and write
DA5E1FE000
unkown
page readonly
23C00D60000
trusted library allocation
page read and write
26CBC327000
unclassified section
page read and write
22A29170000
trusted library allocation
page read and write
23C001AC000
trusted library allocation
page read and write
6EC800801000
trusted library allocation
page read and write
23C00FD4000
trusted library allocation
page read and write
23C01904000
trusted library allocation
page read and write
6EC8006AC000
trusted library allocation
page read and write
CF2000
stack
page read and write
157A0000
direct allocation
page read and write
23C013AD000
trusted library allocation
page read and write
46083000
heap
page read and write
6EC8008EC000
trusted library allocation
page read and write
15978000
heap
page read and write
DA5C9FE000
stack
page read and write
DA5F1FE000
unkown
page readonly
34B7000
heap
page read and write
151000450000
trusted library allocation
page read and write
23C01A0C000
trusted library allocation
page read and write
1510000A0000
trusted library allocation
page read and write
338D000
heap
page read and write
23C018DC000
trusted library allocation
page read and write
23C01A94000
trusted library allocation
page read and write
151000284000
trusted library allocation
page read and write
23C01A7C000
trusted library allocation
page read and write
157E0000
direct allocation
page read and write
26CB6390000
heap
page read and write
23C00E78000
trusted library allocation
page read and write
57C000
stack
page read and write
6EC8006C8000
trusted library allocation
page read and write
23C01580000
trusted library allocation
page read and write
26CB2E28000
heap
page read and write
3332000
heap
page read and write
15100014C000
trusted library allocation
page read and write
6EC80082C000
trusted library allocation
page read and write
23C00CDC000
trusted library allocation
page read and write
23C0194C000
trusted library allocation
page read and write
DA719FE000
stack
page read and write
327A000
heap
page read and write
333D000
heap
page read and write
23C00454000
trusted library allocation
page read and write
34D7000
heap
page read and write
26CBD21E000
trusted library section
page read and write
15130000
direct allocation
page read and write
23C01328000
trusted library allocation
page read and write
34A3000
heap
page read and write
23C002A4000
trusted library allocation
page read and write
23C01EE8000
trusted library allocation
page read and write
23C00218000
trusted library allocation
page read and write
29F00032C000
trusted library allocation
page read and write
15ADD000
heap
page read and write
23C01DD0000
trusted library allocation
page read and write
15790000
direct allocation
page read and write
15620000
direct allocation
page read and write
23C01320000
trusted library allocation
page read and write
15550000
direct allocation
page read and write
14E1E000
direct allocation
page read and write
23C01300000
trusted library allocation
page read and write
23C01D70000
trusted library allocation
page read and write
23C01358000
trusted library allocation
page read and write
15580000
direct allocation
page read and write
23C00CCC000
trusted library allocation
page read and write
23C002CA000
trusted library allocation
page read and write
3396000
heap
page read and write
23C017EC000
trusted library allocation
page read and write
26CB6382000
heap
page read and write
DA7A1FE000
unkown
page readonly
22A22373000
heap
page read and write
15280000
direct allocation
page read and write
151D0000
direct allocation
page read and write
C61AFFE000
unkown
page readonly
3ACB000
unkown
page readonly
336F000
heap
page read and write
4E6000
remote allocation
page execute and read and write
23C01DB4000
trusted library allocation
page read and write
23C01D84000
trusted library allocation
page read and write
23C0009F000
trusted library allocation
page read and write
23C00964000
trusted library allocation
page read and write
26CBABA0000
heap
page read and write
32DE000
heap
page read and write
23C002C4000
trusted library allocation
page read and write
157F0000
direct allocation
page read and write
23C00001000
trusted library allocation
page read and write
23C004C4000
trusted library allocation
page read and write
151000374000
trusted library allocation
page read and write
15720000
direct allocation
page read and write
1BBF5000
heap
page read and write
1DEC00201000
direct allocation
page read and write
34EA000
heap
page read and write
15230000
direct allocation
page read and write
33A8000
heap
page read and write
23C01466000
trusted library allocation
page read and write
15740000
direct allocation
page read and write
6CC42000
unkown
page readonly
23C00BE4000
trusted library allocation
page read and write
23C00C44000
trusted library allocation
page read and write
15100015C000
trusted library allocation
page read and write
3EE0002BC000
trusted library allocation
page read and write
3EE0002D8000
trusted library allocation
page read and write
156C0000
direct allocation
page read and write
DA6D1FE000
unkown
page readonly
152B0000
direct allocation
page read and write
23C00A5C000
trusted library allocation
page read and write
23C016A0000
trusted library allocation
page read and write
6EC8002EC000
trusted library allocation
page read and write
15ABF000
heap
page read and write
23C01A44000
trusted library allocation
page read and write
32F5000
heap
page read and write
23C00928000
trusted library allocation
page read and write
155F0000
direct allocation
page read and write
15620000
direct allocation
page read and write
3332000
heap
page read and write
23C0184C000
trusted library allocation
page read and write
23C01F58000
trusted library allocation
page read and write
23C01320000
trusted library allocation
page read and write
15140000
direct allocation
page read and write
23C01380000
trusted library allocation
page read and write
23C01A34000
trusted library allocation
page read and write
23C0031C000
trusted library allocation
page read and write
15900000
trusted library allocation
page read and write
6EC800844000
trusted library allocation
page read and write
DA6A9FE000
stack
page read and write
34DE000
heap
page read and write
23C800290000
direct allocation
page read and write
151000090000
trusted library allocation
page read and write
15530000
direct allocation
page read and write
151000218000
trusted library allocation
page read and write
15480000
direct allocation
page read and write
23C00CF8000
trusted library allocation
page read and write
15590000
direct allocation
page read and write
23C0064C000
trusted library allocation
page read and write
158A8000
direct allocation
page read and write
C67E7FE000
stack
page read and write
22A204E9000
heap
page read and write
23C0186C000
trusted library allocation
page read and write
26CB637E000
heap
page read and write
23C0040E000
trusted library allocation
page read and write
1510002A4000
trusted library allocation
page read and write
C609FFE000
unkown
page readonly
3479000
heap
page read and write
B48002B8000
trusted library allocation
page read and write
15EA8000
direct allocation
page read and write
23C800274000
direct allocation
page read and write
23C01F34000
trusted library allocation
page read and write
15260000
direct allocation
page read and write
23C001F0000
trusted library allocation
page read and write
15100025C000
trusted library allocation
page read and write
26CBCD8E000
trusted library section
page read and write
15390000
direct allocation
page read and write
26CBCAC0000
trusted library section
page read and write
23C01C78000
trusted library allocation
page read and write
15600000
direct allocation
page read and write
153B0000
direct allocation
page read and write
DA5A9FE000
stack
page read and write
3396000
heap
page read and write
23C01A80000
trusted library allocation
page read and write
23C0165C000
trusted library allocation
page read and write
B4800288000
trusted library allocation
page read and write
C61BFFE000
unkown
page readonly
3287000
heap
page read and write
157B0000
direct allocation
page read and write
32E3000
heap
page read and write
154E0000
direct allocation
page read and write
6EC8008F4000
trusted library allocation
page read and write
1611000
unkown
page execute read
23C00D48000
trusted library allocation
page read and write
23C01BD0000
trusted library allocation
page read and write
151F0000
direct allocation
page read and write
23C0106C000
trusted library allocation
page read and write
15058000
direct allocation
page read and write
15560000
direct allocation
page read and write
15530000
direct allocation
page read and write
26CB30D0000
heap
page read and write
1B8E8000
direct allocation
page execute read
1BB7D000
stack
page read and write
15880000
direct allocation
page read and write
23C01BD0000
trusted library allocation
page read and write
6EC800828000
trusted library allocation
page read and write
23C015B8000
trusted library allocation
page read and write
23C00E84000
trusted library allocation
page read and write
6EC8007AC000
trusted library allocation
page read and write
1DEC00212000
direct allocation
page read and write
23C0104C000
trusted library allocation
page read and write
C603FFE000
unkown
page readonly
6EC80095C000
trusted library allocation
page read and write
23C01E98000
trusted library allocation
page read and write
DA6E9FE000
stack
page read and write
6EC8006E8000
trusted library allocation
page read and write
1B8E1000
direct allocation
page execute read
155F0000
direct allocation
page read and write
1510003B0000
trusted library allocation
page read and write
15160000
direct allocation
page read and write
155E6000
direct allocation
page read and write
153F0000
direct allocation
page read and write
23C001AC000
trusted library allocation
page read and write
3349000
heap
page read and write
151000430000
trusted library allocation
page read and write
3351000
heap
page read and write
C11000
unkown
page execute read
29F0002D8000
trusted library allocation
page read and write
15230000
direct allocation
page read and write
23C017F8000
trusted library allocation
page read and write
23C0100C000
trusted library allocation
page read and write
1DEC00244000
direct allocation
page read and write
26CB68BC000
heap
page read and write
23C00A0C000
trusted library allocation
page read and write
156B0000
direct allocation
page read and write
15130000
direct allocation
page read and write
C678FFE000
unkown
page readonly
1DEC00290000
direct allocation
page read and write
23C018A8000
trusted library allocation
page read and write
23C007C0000
trusted library allocation
page read and write
23C00B14000
trusted library allocation
page read and write
23C01774000
trusted library allocation
page read and write
B4800201000
trusted library allocation
page read and write
23C00C01000
trusted library allocation
page read and write
3EE0002C0000
trusted library allocation
page read and write
26CB686F000
heap
page read and write
15330000
direct allocation
page read and write
14A10000
direct allocation
page read and write
338D000
heap
page read and write
336F000
heap
page read and write
23C013AC000
trusted library allocation
page read and write
23C00AF0000
trusted library allocation
page read and write
34A6000
heap
page read and write
23C01EA8000
trusted library allocation
page read and write
153D0000
direct allocation
page read and write
3492000
heap
page read and write
32E8000
heap
page read and write
26CB6930000
trusted library section
page read and write
1514E000
direct allocation
page read and write
1510002C8000
trusted library allocation
page read and write
23C01698000
trusted library allocation
page read and write
22A2232B000
heap
page read and write
152A0000
direct allocation
page read and write
23C00ED0000
trusted library allocation
page read and write
155B0000
direct allocation
page read and write
3436000
heap
page read and write
C66B7FE000
unkown
page read and write
1510002EC000
trusted library allocation
page read and write
1510002BC000
trusted library allocation
page read and write
156E8000
direct allocation
page read and write
152A0000
direct allocation
page read and write
15410000
direct allocation
page read and write
6EC800788000
trusted library allocation
page read and write
23C00ED0000
trusted library allocation
page read and write
33F8000
heap
page read and write
346D000
heap
page read and write
15630000
direct allocation
page read and write
151000244000
trusted library allocation
page read and write
26CBABEA000
heap
page read and write
23C01F40000
trusted library allocation
page read and write
29F0002C4000
trusted library allocation
page read and write
23C00F44000
trusted library allocation
page read and write
334C000
heap
page read and write
23C0033C000
trusted library allocation
page read and write
39BB000
unkown
page readonly
15120000
direct allocation
page read and write
23C002B4000
trusted library allocation
page read and write
3334000
heap
page read and write
32FA000
heap
page read and write
B48002A8000
trusted library allocation
page read and write
C67A7FD000
stack
page read and write
154D2000
direct allocation
page read and write
33AF000
heap
page read and write
6EC800860000
trusted library allocation
page read and write
1523E000
direct allocation
page read and write
23C0020C000
trusted library allocation
page read and write
34E3000
heap
page read and write
23C00EDC000
trusted library allocation
page read and write
15500000
direct allocation
page read and write
1510002E0000
trusted library allocation
page read and write
1520E000
direct allocation
page read and write
23C00394000
trusted library allocation
page read and write
23C8002DC000
direct allocation
page read and write
15650000
direct allocation
page read and write
15E80000
direct allocation
page read and write
26CB68C3000
heap
page read and write
333D000
heap
page read and write
15270000
direct allocation
page read and write
15450000
direct allocation
page read and write
E48D000
stack
page read and write
23C01C90000
trusted library allocation
page read and write
34D2000
heap
page read and write
23C01D7C000
trusted library allocation
page read and write
15390000
direct allocation
page read and write
23C00740000
trusted library allocation
page read and write
15670000
direct allocation
page read and write
26CB638A000
heap
page read and write
3281000
heap
page read and write
156CF000
stack
page read and write
23FD000
unkown
page readonly
22A204FD000
heap
page read and write
23C0164C000
trusted library allocation
page read and write
A1BF000
stack
page read and write
1BBF2000
heap
page read and write
15340000
direct allocation
page read and write
23C001E4000
trusted library allocation
page read and write
23C01930000
trusted library allocation
page read and write
23C002B8000
trusted library allocation
page read and write
22A22FC0000
unkown
page read and write
22A2049F000
heap
page read and write
1491E000
direct allocation
page read and write
151000374000
trusted library allocation
page read and write
151B0000
direct allocation
page read and write
1594B000
stack
page read and write
23C00CF9000
trusted library allocation
page read and write
3455000
heap
page read and write
DA721FE000
unkown
page readonly
DA751FE000
unkown
page readonly
23C00C68000
trusted library allocation
page read and write
22A20380000
heap
page read and write
15860000
direct allocation
page read and write
23C01EDC000
trusted library allocation
page read and write
29F000338000
trusted library allocation
page read and write
23C00350000
trusted library allocation
page read and write
338D000
heap
page read and write
2EE0000
heap
page read and write
B48002B4000
trusted library allocation
page read and write
15090000
direct allocation
page read and write
93E000
stack
page read and write
151000130000
trusted library allocation
page read and write
1DEC002E0000
direct allocation
page read and write
151000140000
trusted library allocation
page read and write
337B000
heap
page read and write
B48002B4000
trusted library allocation
page read and write
23C00D08000
trusted library allocation
page read and write
23C004E0000
trusted library allocation
page read and write
15750000
direct allocation
page read and write
15820000
direct allocation
page read and write
346A000
heap
page read and write
149CE000
direct allocation
page read and write
23C0132C000
trusted library allocation
page read and write
338D000
heap
page read and write
3EE000250000
trusted library allocation
page read and write
23C01E98000
trusted library allocation
page read and write
1BA46000
direct allocation
page execute read
15748000
direct allocation
page read and write
23C0160C000
trusted library allocation
page read and write
23C00CF8000
trusted library allocation
page read and write
23C01A54000
trusted library allocation
page read and write
6EC800700000
trusted library allocation
page read and write
23C01CC8000
trusted library allocation
page read and write
23C013F0000
trusted library allocation
page read and write
C61B7FD000
stack
page read and write
23C01EF8000
trusted library allocation
page read and write
150FE000
direct allocation
page read and write
1DEC00274000
direct allocation
page read and write
23C002A4000
trusted library allocation
page read and write
23C8002AC000
direct allocation
page read and write
15700000
direct allocation
page read and write
15640000
direct allocation
page read and write
33B9000
heap
page read and write
154F0000
direct allocation
page read and write
23C01DEC000
trusted library allocation
page read and write
22A223CF000
heap
page read and write
23C002B8000
trusted library allocation
page read and write
15690000
direct allocation
page read and write
3481000
heap
page read and write
15140000
direct allocation
page read and write
1522E000
direct allocation
page read and write
1510001E4000
trusted library allocation
page read and write
156F8000
direct allocation
page read and write
334B000
heap
page read and write
23C01AFC000
trusted library allocation
page read and write
6EC80039C000
trusted library allocation
page read and write
151000274000
trusted library allocation
page read and write
23C00948000
trusted library allocation
page read and write
155E0000
direct allocation
page read and write
155D0000
direct allocation
page read and write
23C00E38000
trusted library allocation
page read and write
1573B000
stack
page read and write
26CB687B000
heap
page read and write
1510004A8000
trusted library allocation
page read and write
2FF0000
heap
page read and write
33C0000
heap
page read and write
14CDE000
direct allocation
page read and write
26CB6382000
heap
page read and write
1510002D4000
trusted library allocation
page read and write
3361000
heap
page read and write
26CBC3F0000
heap
page read and write
23C00518000
trusted library allocation
page read and write
151E0000
direct allocation
page read and write
155D0000
direct allocation
page read and write
6EC800880000
trusted library allocation
page read and write
B4800250000
trusted library allocation
page read and write
26CBCD61000
trusted library section
page read and write
23C00A68000
trusted library allocation
page read and write
23C01954000
trusted library allocation
page read and write
23C019C4000
trusted library allocation
page read and write
22A22377000
heap
page read and write
23C00304000
trusted library allocation
page read and write
1560A000
direct allocation
page read and write
152E0000
direct allocation
page read and write
C6087FD000
stack
page read and write
C605FFE000
unkown
page readonly
33AF000
heap
page read and write
23C800230000
direct allocation
page read and write
23C01198000
trusted library allocation
page read and write
23C01A58000
trusted library allocation
page read and write
3EE000278000
trusted library allocation
page read and write
23C004E0000
trusted library allocation
page read and write
15210000
direct allocation
page read and write
23C017C8000
trusted library allocation
page read and write
23C01270000
trusted library allocation
page read and write
15190000
direct allocation
page read and write
335F000
heap
page read and write
3385000
heap
page read and write
338D000
heap
page read and write
32E8000
heap
page read and write
23C0111C000
trusted library allocation
page read and write
DA611FE000
unkown
page readonly
1DEC002EC000
direct allocation
page read and write
3376000
heap
page read and write
337B000
heap
page read and write
157B0000
direct allocation
page read and write
1510001F0000
trusted library allocation
page read and write
155F8000
direct allocation
page read and write
29F000418000
trusted library allocation
page read and write
B48002B4000
trusted library allocation
page read and write
DA569FE000
stack
page read and write
23C01E24000
trusted library allocation
page read and write
23C001AC000
trusted library allocation
page read and write
151C0000
direct allocation
page read and write
15560000
direct allocation
page read and write
23C00D18000
trusted library allocation
page read and write
23C0100C000
trusted library allocation
page read and write
3455000
heap
page read and write
15240000
direct allocation
page read and write
23C00819000
trusted library allocation
page read and write
6CBB0000
unkown
page readonly
23C00750000
trusted library allocation
page read and write
1521E000
direct allocation
page read and write
157C0000
direct allocation
page read and write
1DEC00308000
direct allocation
page read and write
23C01F48000
trusted library allocation
page read and write
23C01164000
trusted library allocation
page read and write
23C0136C000
trusted library allocation
page read and write
154C0000
direct allocation
page read and write
15650000
direct allocation
page read and write
23C0140C000
trusted library allocation
page read and write
158C8000
direct allocation
page read and write
3EE000201000
trusted library allocation
page read and write
35BA000
heap
page read and write
151C0000
direct allocation
page read and write
C6027FC000
stack
page read and write
26CB5620000
unkown
page read and write
23C019A4000
trusted library allocation
page read and write
3426000
heap
page read and write
15100021C000
trusted library allocation
page read and write
158D0000
direct allocation
page read and write
15EAC000
direct allocation
page read and write
15600000
direct allocation
page read and write
6EC80081C000
trusted library allocation
page read and write
15170000
direct allocation
page read and write
23C01A78000
trusted library allocation
page read and write
151B0000
direct allocation
page read and write
C6727FA000
stack
page read and write
23C00FC0000
trusted library allocation
page read and write
6EC800728000
trusted library allocation
page read and write
23C01080000
trusted library allocation
page read and write
23C0104C000
trusted library allocation
page read and write
3281000
heap
page read and write
C66DFFE000
unkown
page readonly
23C01F78000
trusted library allocation
page read and write
26CB637E000
heap
page read and write
23C001C8000
trusted library allocation
page read and write
152C0000
direct allocation
page read and write
26CB2F15000
heap
page read and write
6CBB1000
unkown
page execute read
15130000
direct allocation
page read and write
15270000
direct allocation
page read and write
23C017BC000
trusted library allocation
page read and write
6EC800248000
trusted library allocation
page read and write
6CC51000
unkown
page execute read
151000401000
trusted library allocation
page read and write
There are 2556 hidden memdumps, click here to show them.