IOC Report
TiKj3IVDj4.exe

loading gif

Files

File Path
Type
Category
Malicious
TiKj3IVDj4.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History_tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data_tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies_tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data_tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History_tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data_tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies_tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\amady.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\charset_normalizer\md.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\charset_normalizer\md__mypyc.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\python311.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\vcruntime140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\zstandard\_cffi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\zstandard\backend_c.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite_tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.db_tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite_tmp
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data_tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Fh4Koa.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\Save-bK4ZLdG8gdM\Browsers\bookmarks.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Save-bK4ZLdG8gdM\Browsers\quickcookie-Chrome [ Default ].txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Save-bK4ZLdG8gdM\Informations.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Save-xEyCmDsW0Tz.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n42cx1x1.v0x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o4rywecb.wgf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Cipher\_Salsa20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Cipher\_raw_aes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Cipher\_raw_aesni.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Cipher\_raw_cbc.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Cipher\_raw_cfb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Cipher\_raw_ctr.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Cipher\_raw_des3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Cipher\_raw_ecb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Cipher\_raw_eksblowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Cipher\_raw_ocb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Cipher\_raw_ofb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Hash\_BLAKE2s.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Hash\_MD5.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Hash\_SHA1.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Hash\_SHA224.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Hash\_SHA256.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Hash\_SHA384.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Hash\_SHA512.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Hash\_ghash_clmul.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Hash\_ghash_portable.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Hash\_keccak.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Protocol\_scrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Util\_cpuid_c.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\Crypto\Util\_strxor.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite_tmp-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite_tmp-shm
data
dropped
There are 60 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TiKj3IVDj4.exe
"C:\Users\user\Desktop\TiKj3IVDj4.exe"
malicious
C:\Users\user\AppData\Local\Temp\onefile_3036_133579471939995170\amady.exe
"C:\Users\user\Desktop\TiKj3IVDj4.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -c "Get-WmiObject -Query \"Select * from Win32_CacheMemory\""
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\HOSTNAME.EXE
hostname
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid | more +1"
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get uuid
C:\Windows\System32\more.com
more +1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic OS get caption, osarchitecture | more +1"
C:\Windows\System32\wbem\WMIC.exe
wmic OS get caption, osarchitecture
C:\Windows\System32\more.com
more +1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic cpu get name | more +1"
C:\Windows\System32\wbem\WMIC.exe
wmic cpu get name
C:\Windows\System32\more.com
more +1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic PATH Win32_VideoController get name | more +1"
C:\Windows\System32\wbem\WMIC.exe
wmic PATH Win32_VideoController get name
C:\Windows\System32\more.com
more +1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory | more +1"
C:\Windows\System32\wbem\WMIC.exe
wmic computersystem get totalphysicalmemory
C:\Windows\System32\more.com
more +1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crlnq
unknown
http://www.accv.es/legislacion_c.htmj
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://repository.swisssign.com/?
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.cert.fnmt.es/dpcs/k9
unknown
https://github.com/urllib3/urllib3/issues/2168
unknown
http://crl.dhimyotis.com/certignarootca.crl8
unknown
http://ocsp.accv.esMH
unknown
http://repository.swisssign.com/7
unknown
http://crl.dhimyotis.com/certignarootca.crlvr
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
http://crl.dhimyotis.com/certignarootca.crl.Y_)#
unknown
http://www.accv.es/legislacion_c.htmH
unknown
https://api.anonfiles.com/upload
unknown
http://www.accv.es/legislacion_c.htm7P
unknown
http://www.accv.es/legislacion_c.htmN
unknown
http://crl.dhimyotis.com/certignarootca.crlI
unknown
http://repository.swisssign.com/c
unknown
http://repository.swisssign.com/d
unknown
http://crl.dhimyotis.com/certignarootca.crlK
unknown
http://crl.dhimyotis.com/certignarootca.crlet
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
https://tools.ietf.org/html/rfc3610
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://speleotrove.com/decimal/decarith.html
unknown
http://www.accv.es/legislacion_c.htm=
unknown
https://github.com/urllib3/urllib3/issues/3020
unknown
http://repository.swisssign.com/U
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#socks-proxies
unknown
http://repository.swisssign.com/Y
unknown
http://repository.swisssign.com/Z
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
http://www.accv.es/legislacion_c.htm)
unknown
http://www.accv.es/legislacion_c.htm-
unknown
https://github.com/python/cpython/issues/86361.
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crlHZ=)
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://httpbin.org/
unknown
http://repository.swisssign.com/p
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
unknown
https://gofile.io
unknown
http://repository.swisssign.com/s
unknown
https://www.ecosia.org/newtab/
unknown
http://repository.swisssign.com/u
unknown
http://repository.swisssign.com/x
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crlon
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://google.com/mail
unknown
http://www.accv.es00
unknown
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
unknown
http://www.rfc-editor.org/info/rfc7253
unknown
http://crl.xrampsecurity.com/XGCA.crlrtreeL
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://ocsp.accv.esu
unknown
https://mahler:8092/site-updates.py
unknown
http://www.quovadisglobal.com/cpsR
unknown
http://ocsp.accv.esd
unknown
http://www.firmaprofesional.com/cps0
unknown
http://www.quovadisglobal.com/cpsl
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
http://crl.securetrust.com/STCA.crlsnippet
unknown
http://www.quovadisglobal.com/cps_
unknown
https://requests.readthedocs.ioa__url__u2.31.0a__version__l1
unknown
http://crl.securetrust.com/SGCA.crl5
unknown
https://github.com/urllib3/urllib3/issues/3020aNotOpenSSLWarningaOPENSSL_VERSION_INFOT
unknown
http://ocsp.accv.esY
unknown
https://www.pyopenssl.org
unknown
http://www.iana.org/time-zones/repository/tz-link.html
unknown
http://ocsp.accv.esJ
unknown
http://www.cert.fnmt.es/dpcs/r
unknown
http://ocsp.accv.esrl
unknown
http://www.quovadisglobal.com/cpsA
unknown
http://crl.securetrust.com/STCA.crlies_1
unknown
https://api.gofile.io/getServer
unknown
http://www.cert.fnmt.es/dpcs/w
unknown
http://crl.securetrust.com/SGCA.crlh
unknown
http://www.cert.fnmt.es/dpcs/Rv
unknown
http://crl.securetrust.com/SGCA.crll
unknown
http://ocsp.accv.es8
unknown
http://www.cert.fnmt.es/dpcs/o
unknown
http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.cert.fnmt.es/dpcs/b
unknown
http://www.cert.fnmt.es/dpcs/c
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl3L
unknown
http://ocsp.accv.es0
unknown
https://www.python.org/
unknown
http://www.cert.fnmt.es/dpcs/g
unknown
http://www.quovadisglobal.com/cps&
unknown
http://ocsp.accv.es(
unknown
https://github.com/facebook/zstd/blob/dev/lib/zstd.h).
unknown
http://crl.dhimyotis.com/certignarootca.crlGx$
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.anonfiles.com
unknown
malicious
up1.fileditchnew.ch
2.58.57.168
api.ipify.org
104.26.12.205
api.gofile.io
51.178.66.33
up1.fileditch.com
unknown

IPs

IP
Domain
Country
Malicious
2.58.57.168
up1.fileditchnew.ch
Netherlands
104.26.12.205
api.ipify.org
United States
51.178.66.33
api.gofile.io
France
51.38.43.18
unknown
France

Memdumps

Base Address
Regiontype
Protect
Malicious
1CA5FFF7000
heap
page read and write
malicious
1CA5FFEB000
heap
page read and write
malicious
1CA5FFEB000
heap
page read and write
malicious
1CB01BF2000
heap
page read and write
1CA6114A000
heap
page read and write
1CA60CAC000
heap
page read and write
1CA60D68000
heap
page read and write
1CA6010D000
heap
page read and write
1CA60F4E000
heap
page read and write
23DD189A000
heap
page read and write
1CB01BD5000
heap
page read and write
1CA60D05000
heap
page read and write
1CA60CFA000
heap
page read and write
1CB01BA7000
heap
page read and write
1CA60B10000
heap
page read and write
1CA60D5E000
heap
page read and write
1CA60C4A000
heap
page read and write
1CA60E77000
heap
page read and write
1CA6010D000
heap
page read and write
1CA60F28000
heap
page read and write
1CA611BB000
heap
page read and write
1CB021F9000
heap
page read and write
1CA60130000
heap
page read and write
24C88D2A000
heap
page read and write
1CA60BD8000
heap
page read and write
18D018F9000
heap
page read and write
1CA60AD8000
heap
page read and write
1AAACD0D000
heap
page read and write
1CA60BCF000
heap
page read and write
1CA600F3000
heap
page read and write
1CA60C29000
heap
page read and write
7FFAAB620000
trusted library allocation
page read and write
1CA60102000
heap
page read and write
18D018E8000
heap
page read and write
24C88D0A000
heap
page read and write
1CA60EF9000
heap
page read and write
23DD1884000
heap
page read and write
1CA60E20000
heap
page read and write
24C88785000
heap
page read and write
1CA600C8000
heap
page read and write
84885FF000
stack
page read and write
1CA60E49000
heap
page read and write
1CA60FE6000
heap
page read and write
1CA60E64000
heap
page read and write
2235A384000
heap
page read and write
1CA61042000
heap
page read and write
1CA60ABB000
heap
page read and write
7FFAAB580000
trusted library allocation
page read and write
1CA60AE3000
heap
page read and write
1CA60113000
heap
page read and write
223582E0000
heap
page read and write
18D018D1000
heap
page read and write
1CA6115B000
heap
page read and write
1CA60D2F000
heap
page read and write
1CA60C7F000
heap
page read and write
18D018F2000
heap
page read and write
1E113D1B000
heap
page read and write
18D018E9000
heap
page read and write
18564710000
heap
page read and write
1E113D58000
heap
page read and write
1CA60E63000
heap
page read and write
272788C0000
heap
page read and write
23DD3801000
heap
page read and write
1CA60113000
heap
page read and write
1CA60C1C000
heap
page read and write
1CA60DF8000
heap
page read and write
1CA61229000
heap
page read and write
1CA60AFC000
heap
page read and write
1CA60D04000
heap
page read and write
C77317D000
stack
page read and write
1CA60F75000
heap
page read and write
1CA60C7A000
heap
page read and write
1CA60102000
heap
page read and write
18D01844000
heap
page read and write
261BE4D9000
heap
page read and write
1CA61072000
heap
page read and write
1CB01E85000
heap
page read and write
1CA600F3000
heap
page read and write
1CA6108A000
heap
page read and write
23DD1F8C000
heap
page read and write
1CA60CB1000
heap
page read and write
1CA600F1000
heap
page read and write
223589E8000
heap
page read and write
1CA60F09000
heap
page read and write
1CB01C02000
heap
page read and write
24C88D2A000
heap
page read and write
1CA60130000
heap
page read and write
1CA60135000
heap
page read and write
1CA6122C000
heap
page read and write
223589DC000
heap
page read and write
223584CE000
heap
page read and write
1CB01C09000
heap
page read and write
1CB021FC000
heap
page read and write
1CA60B23000
heap
page read and write
1CA60BBE000
heap
page read and write
1CA60C9A000
heap
page read and write
1CA60AE1000
heap
page read and write
1CA60ECB000
heap
page read and write
1CA6010F000
heap
page read and write
2112D450000
heap
page execute and read and write
1CA60F45000
heap
page read and write
23DD1830000
heap
page read and write
1CA60E12000
heap
page read and write
1CA60BE7000
heap
page read and write
84884FE000
stack
page read and write
1CA60AF0000
heap
page read and write
1CA600FF000
heap
page read and write
18D017DE000
heap
page read and write
285F33E000
stack
page read and write
1CA60B01000
heap
page read and write
1CA6105D000
heap
page read and write
C24A27F000
stack
page read and write
1CA61147000
heap
page read and write
23DD1F92000
heap
page read and write
23DD1ADD000
heap
page read and write
1CA61074000
heap
page read and write
1CA600C6000
heap
page read and write
1CA61206000
heap
page read and write
1CA61095000
heap
page read and write
1CA60130000
heap
page read and write
1CA6113F000
heap
page read and write
2ABA1840000
heap
page read and write
23DD1895000
heap
page read and write
2ABA17E0000
heap
page read and write
1CA60F6C000
heap
page read and write
1CA60D33000
heap
page read and write
1CB021D7000
heap
page read and write
1CA60EEB000
heap
page read and write
18D03690000
heap
page read and write
2235833C000
heap
page read and write
1CA60D2A000
heap
page read and write
7FFB05A65000
unkown
page readonly
1CA60E4E000
heap
page read and write
7FFAAB370000
trusted library allocation
page read and write
1CA60D5D000
heap
page read and write
23DD1886000
heap
page read and write
1CA60044000
heap
page read and write
1CA60C9B000
heap
page read and write
1CA60E26000
heap
page read and write
1CA60AF0000
heap
page read and write
1CA60B05000
heap
page read and write
1CA61158000
heap
page read and write
23DD380E000
heap
page read and write
1CA61072000
heap
page read and write
1CA60BCE000
heap
page read and write
1CA60F6C000
heap
page read and write
18D01845000
heap
page read and write
1CA611E9000
heap
page read and write
1CA600C4000
heap
page read and write
1CA60ED7000
heap
page read and write
1CA60BCE000
heap
page read and write
1CA60EA9000
heap
page read and write
C249F2E000
stack
page read and write
2112CE90000
trusted library allocation
page read and write
1CA60ADB000
heap
page read and write
1CA60CB4000
heap
page read and write
1AAAFE23000
heap
page read and write
1CA60AFB000
heap
page read and write
23DD1848000
heap
page read and write
1CA61199000
heap
page read and write
1CA60157000
heap
page read and write
1CA60C7C000
heap
page read and write
1CA60AFA000
heap
page read and write
1CA6109D000
heap
page read and write
18564730000
heap
page read and write
1CA6010D000
heap
page read and write
1AAACCB0000
heap
page read and write
1CA60CA6000
heap
page read and write
1CA60F41000
heap
page read and write
223589D9000
heap
page read and write
285EF79000
stack
page read and write
1CA60E97000
heap
page read and write
7FF7A1950000
unkown
page readonly
1E113FE0000
heap
page read and write
7FFB1E540000
unkown
page read and write
1CA61194000
heap
page read and write
24C88D04000
heap
page read and write
1CA60CE6000
heap
page read and write
1CA60AEB000
heap
page read and write
7FFB1E520000
unkown
page readonly
1CA60DD9000
heap
page read and write
1CA600F3000
heap
page read and write
1CA60DFE000
heap
page read and write
1CA60CBD000
heap
page read and write
1AAAF629000
heap
page read and write
1CA60E4F000
heap
page read and write
1CA600E4000
heap
page read and write
24C88785000
heap
page read and write
2861AF70000
heap
page read and write
1CA60BED000
heap
page read and write
24C88D0E000
heap
page read and write
18D01CA5000
heap
page read and write
1CA600F3000
heap
page read and write
18D018F1000
heap
page read and write
1CA60BA4000
heap
page read and write
7FFAAB570000
trusted library allocation
page read and write
1CB021F9000
heap
page read and write
1CA60E07000
heap
page read and write
1CB021DC000
heap
page read and write
1CA60CC3000
heap
page read and write
1CA60AF5000
heap
page read and write
1CA6119F000
heap
page read and write
1CA600FF000
heap
page read and write
1CB021FA000
heap
page read and write
1CA600D1000
heap
page read and write
1CA60D8F000
heap
page read and write
1AAAFA98000
heap
page read and write
223589E1000
heap
page read and write
1CA60C92000
heap
page read and write
1CA60F39000
heap
page read and write
1CA60BE7000
heap
page read and write
24C88D2A000
heap
page read and write
18D018B8000
heap
page read and write
1CA6117D000
heap
page read and write
1CA6106D000
heap
page read and write
1CA600DF000
heap
page read and write
1CA60B12000
heap
page read and write
1CA60C60000
heap
page read and write
23DD18A3000
heap
page read and write
1CA61020000
heap
page read and write
1CA600F7000
heap
page read and write
1CA60ED2000
heap
page read and write
1CA60BBA000
heap
page read and write
1CA60CA7000
heap
page read and write
22358333000
heap
page read and write
2235A370000
heap
page read and write
1CA600FF000
heap
page read and write
1CA60BBE000
heap
page read and write
1CA611BB000
heap
page read and write
1CA60DB3000
heap
page read and write
2112D461000
trusted library allocation
page read and write
1CA60031000
heap
page read and write
22358319000
heap
page read and write
1CA60D2B000
heap
page read and write
24C88757000
heap
page read and write
1CA60116000
heap
page read and write
1CA60044000
heap
page read and write
1CA610FF000
heap
page read and write
1CA60222000
heap
page read and write
1CA60C1B000
heap
page read and write
23DD1A0B000
heap
page read and write
1CA600D5000
heap
page read and write
2112B3F0000
heap
page read and write
1CA60C90000
heap
page read and write
1CA60CB0000
heap
page read and write
1CA60ECB000
heap
page read and write
18D018FC000
heap
page read and write
23DD1F94000
heap
page read and write
1CA600C6000
heap
page read and write
1CA60E86000
heap
page read and write
18D018E1000
heap
page read and write
1CB03A75000
heap
page read and write
1CA60DC7000
heap
page read and write
1CA60F13000
heap
page read and write
2ABA1889000
heap
page read and write
7FFB1E540000
unkown
page read and write
1CA60EE3000
heap
page read and write
1CA60138000
heap
page read and write
1CA60C25000
heap
page read and write
1CA60ABB000
heap
page read and write
1AAACCC8000
heap
page read and write
1CA60D59000
heap
page read and write
1CA600F6000
heap
page read and write
7FFAAB416000
trusted library allocation
page read and write
1CA610C3000
heap
page read and write
1CA61252000
heap
page read and write
1CA61282000
heap
page read and write
1CA60E52000
heap
page read and write
1CA60AE6000
heap
page read and write
1CA6122E000
heap
page read and write
223589F9000
heap
page read and write
1CA601FC000
heap
page read and write
1CA60123000
heap
page read and write
1CA60E86000
heap
page read and write
1CA61001000
heap
page read and write
1CA60C56000
heap
page read and write
1CA6122E000
heap
page read and write
24C88D38000
heap
page read and write
7FFAAB420000
trusted library allocation
page execute and read and write
2727890A000
heap
page read and write
848857E000
stack
page read and write
1CA60CC3000
heap
page read and write
1CA60DAE000
heap
page read and write
1CA60FA0000
heap
page read and write
7FF66502D000
unkown
page readonly
1AAAFA67000
heap
page read and write
1CA6125F000
heap
page read and write
1AAAF663000
heap
page read and write
1CA611D1000
heap
page read and write
1CA60B0F000
heap
page read and write
1CA61262000
heap
page read and write
1CA61090000
heap
page read and write
1CA600C4000
heap
page read and write
1CA600C4000
heap
page read and write
1CA60D09000
heap
page read and write
1CA61260000
heap
page read and write
1CA60B05000
heap
page read and write
1CA60AEC000
heap
page read and write
7FFB1E542000
unkown
page readonly
1CA611FB000
heap
page read and write
24C88D2A000
heap
page read and write
1CA60CB9000
heap
page read and write
1CA61261000
heap
page read and write
57BA9CC000
stack
page read and write
1CA60116000
heap
page read and write
18D01DF7000
heap
page read and write
18D01DFC000
heap
page read and write
1CA60D20000
heap
page read and write
1CA60D41000
heap
page read and write
24C8A750000
heap
page read and write
1CA60CAA000
heap
page read and write
20EE4FE000
unkown
page read and write
1CA600E4000
heap
page read and write
1CA61111000
heap
page read and write
23DD18AC000
heap
page read and write
1CA60FBA000
heap
page read and write
1CA600B5000
heap
page read and write
24C887B8000
heap
page read and write
1CA60D0A000
heap
page read and write
1CA60E89000
heap
page read and write
7FFAAB480000
trusted library allocation
page execute and read and write
1CA610D1000
heap
page read and write
1CA60226000
heap
page read and write
1CA600E4000
heap
page read and write
1CA60B14000
heap
page read and write
18D0184F000
heap
page read and write
1CA61047000
heap
page read and write
22358321000
heap
page read and write
22D597B0000
heap
page read and write
1CA611C4000
heap
page read and write
7FFB1E536000
unkown
page readonly
1CB01B60000
trusted library allocation
page read and write
1CA60DE2000
heap
page read and write
1CA61074000
heap
page read and write
CA5D10C000
stack
page read and write
18D018E8000
heap
page read and write
1CA60EE3000
heap
page read and write
1CA60ED1000
heap
page read and write
1CA601FC000
heap
page read and write
1CA601FC000
heap
page read and write
1CA60CBD000
heap
page read and write
1CA60130000
heap
page read and write
1CA60CB9000
heap
page read and write
1CA60ED2000
heap
page read and write
1CB01BE4000
heap
page read and write
1CA60E26000
heap
page read and write
24C88590000
heap
page read and write
1CA6010D000
heap
page read and write
1CA60B10000
heap
page read and write
1CA60D0F000
heap
page read and write
7FFAAB560000
trusted library allocation
page read and write
1CA60D41000
heap
page read and write
1CA60E01000
heap
page read and write
1CA60044000
heap
page read and write
1CA60BE7000
heap
page read and write
1CA60059000
heap
page read and write
18D018FB000
heap
page read and write
1CA60C27000
heap
page read and write
7FFB1E521000
unkown
page execute read
23DD1F74000
heap
page read and write
1CA60D40000
heap
page read and write
1CA60F9D000
heap
page read and write
1CA60DC7000
heap
page read and write
1CA611D6000
heap
page read and write
1CA60169000
heap
page read and write
1CB01BB7000
heap
page read and write
1CA61170000
heap
page read and write
2235834D000
heap
page read and write
1CA60C59000
heap
page read and write
1CA600F7000
heap
page read and write
1CA60D2D000
heap
page read and write
24C88705000
heap
page read and write
223582E8000
heap
page read and write
23DD1F71000
heap
page read and write
1CA61090000
heap
page read and write
1CA600F3000
heap
page read and write
1CA60102000
heap
page read and write
1CA611EC000
heap
page read and write
1CA600D1000
heap
page read and write
1CA61090000
heap
page read and write
18D01E22000
heap
page read and write
2235833D000
heap
page read and write
1CA601FC000
heap
page read and write
27278A00000
heap
page read and write
1CA61159000
heap
page read and write
1CA60135000
heap
page read and write
1CA60D72000
heap
page read and write
1CA60C94000
heap
page read and write
1CA6013C000
heap
page read and write
24C8A5BD000
heap
page read and write
2112CE20000
trusted library allocation
page read and write
23DD1F7D000
heap
page read and write
1CA600FF000
heap
page read and write
1CA611C5000
heap
page read and write
1CA60044000
heap
page read and write
223589EB000
heap
page read and write
7FFB1E521000
unkown
page execute read
1ACDF860000
heap
page read and write
1CA61035000
heap
page read and write
1CA60ED2000
heap
page read and write
23DD1F7D000
heap
page read and write
1CA60D1F000
heap
page read and write
1CA600C4000
heap
page read and write
1CA60061000
heap
page read and write
1AAAFAA8000
heap
page read and write
24C88763000
heap
page read and write
1CB03A85000
heap
page read and write
22358361000
heap
page read and write
1CA60F0B000
heap
page read and write
223589EB000
heap
page read and write
1CA60EFC000
heap
page read and write
24C88798000
heap
page read and write
1CB03A7E000
heap
page read and write
24C886B0000
trusted library allocation
page read and write
2861AFF0000
heap
page read and write
1CA600FF000
heap
page read and write
1CB01DE0000
heap
page read and write
1CA60F1F000
heap
page read and write
1CA60BD8000
heap
page read and write
1CA60D89000
heap
page read and write
1CA600C8000
heap
page read and write
24C8A5B3000
heap
page read and write
171803E0000
heap
page read and write
1CA60B23000
heap
page read and write
1ACDF8BB000
heap
page read and write
223582F7000
heap
page read and write
1CA60FA8000
heap
page read and write
1CA61090000
heap
page read and write
24C8870E000
heap
page read and write
1CA60DD0000
heap
page read and write
2112E982000
trusted library allocation
page read and write
18D01827000
heap
page read and write
1CA60E2D000
heap
page read and write
1CA610A0000
heap
page read and write
1CA60BD1000
heap
page read and write
21145460000
heap
page read and write
1CA60C94000
heap
page read and write
7FFAAB542000
trusted library allocation
page read and write
1CA60B9C000
heap
page read and write
223589D0000
heap
page read and write
1CA60CB9000
heap
page read and write
1CA60031000
heap
page read and write
1CA60155000
heap
page read and write
1CA60113000
heap
page read and write
22358363000
heap
page read and write
1CA60102000
heap
page read and write
1CA60CBF000
heap
page read and write
1CA61042000
heap
page read and write
1CA600C6000
heap
page read and write
1ACDF8D0000
heap
page read and write
1CA60FF4000
heap
page read and write
1CA60AE0000
heap
page read and write
1CA6002D000
heap
page read and write
22358A03000
heap
page read and write
18D0186F000
heap
page read and write
1CA60D7E000
heap
page read and write
23DD1A05000
heap
page read and write
23DD1A0E000
heap
page read and write
1E113D48000
heap
page read and write
1CA60DC7000
heap
page read and write
1CA60102000
heap
page read and write
1CA600E4000
heap
page read and write
2235834C000
heap
page read and write
1CA60BED000
heap
page read and write
1CA60BED000
heap
page read and write
18D01877000
heap
page read and write
2235A37E000
heap
page read and write
1CA60DA3000
heap
page read and write
1CA60AF6000
heap
page read and write
1CA610F9000
heap
page read and write
1CA61207000
heap
page read and write
23DD1F60000
heap
page read and write
23DD1ADA000
heap
page read and write
1CA60CD1000
heap
page read and write
1CA60130000
heap
page read and write
1CA61090000
heap
page read and write
1CA600C5000
heap
page read and write
1CA6115A000
heap
page read and write
1CA600C8000
heap
page read and write
24C88D02000
heap
page read and write
1CA60F8E000
heap
page read and write
18D01C90000
heap
page read and write
20EE5FF000
stack
page read and write
1CA6108A000
heap
page read and write
1CA61014000
heap
page read and write
1CA60AE1000
heap
page read and write
1CA611B6000
heap
page read and write
24C887BF000
heap
page read and write
1CA60F8F000
heap
page read and write
1CA60FA4000
heap
page read and write
1CA6100F000
heap
page read and write
1AAAF99D000
heap
page read and write
F2265FF000
stack
page read and write
23DD1F6F000
heap
page read and write
2861AFF5000
heap
page read and write
1AAAF64F000
heap
page read and write
22358362000
heap
page read and write
2112CEE0000
heap
page read and write
1CA61074000
heap
page read and write
1CA600F5000
heap
page read and write
23DD1950000
trusted library allocation
page read and write
1CA600D1000
heap
page read and write
2112B4F0000
heap
page read and write
1CA61037000
heap
page read and write
1CA60CEE000
heap
page read and write
1CA60E63000
heap
page read and write
24C88D0A000
heap
page read and write
1CA60AEF000
heap
page read and write
1CA60BCB000
heap
page read and write
18D018A3000
heap
page read and write
27968DB0000
heap
page read and write
1CA610D0000
heap
page read and write
1CA60EAC000
heap
page read and write
1AAAF5D9000
heap
page read and write
1CA610C8000
heap
page read and write
1CA61003000
heap
page read and write
1CA60BE7000
heap
page read and write
2113D613000
trusted library allocation
page read and write
1CA60FC0000
heap
page read and write
1CA60C64000
heap
page read and write
1CA600FF000
heap
page read and write
1CA600C8000
heap
page read and write
1CA6108A000
heap
page read and write
1CA60F03000
heap
page read and write
1CA60F25000
heap
page read and write
1CA6119C000
heap
page read and write
1CA61114000
heap
page read and write
1CA600E4000
heap
page read and write
1CA61213000
heap
page read and write
1CA6120D000
heap
page read and write
18D01E2A000
heap
page read and write
1CA60E83000
heap
page read and write
1CA60D94000
heap
page read and write
1CA600D8000
heap
page read and write
1CA61136000
heap
page read and write
1CA6116E000
heap
page read and write
1CA60AFE000
heap
page read and write
22358348000
heap
page read and write
7FFB1E520000
unkown
page readonly
1CA600F7000
heap
page read and write
1CA60CAD000
heap
page read and write
1CA60BE7000
heap
page read and write
18D01CAA000
heap
page read and write
1CA6122E000
heap
page read and write
7FFB1E536000
unkown
page readonly
1CA60C8D000
heap
page read and write
23DD1F89000
heap
page read and write
1CA60BE7000
heap
page read and write
223589EB000
heap
page read and write
1CA60BC9000
heap
page read and write
1CA60D06000
heap
page read and write
272789E0000
heap
page read and write
1CA60116000
heap
page read and write
2112E97C000
trusted library allocation
page read and write
1CA610FD000
heap
page read and write
1CA60CC2000
heap
page read and write
223589C3000
heap
page read and write
18D01750000
heap
page read and write
1CA5FF93000
heap
page read and write
1CA60D20000
heap
page read and write
1CA6005A000
heap
page read and write
1CA611E1000
heap
page read and write
1CA5E238000
heap
page read and write
1CA5FF05000
heap
page read and write
1CA60130000
heap
page read and write
1CA61221000
heap
page read and write
1CA61125000
heap
page read and write
285EC7E000
stack
page read and write
1CB01BA0000
heap
page read and write
24C88D38000
heap
page read and write
1CA60116000
heap
page read and write
1CA60AFB000
heap
page read and write
1CA61042000
heap
page read and write
1CA60C8C000
heap
page read and write
2235833B000
heap
page read and write
1E113D30000
heap
page read and write
1CA60F07000
heap
page read and write
1CA61206000
heap
page read and write
7FFB1E545000
unkown
page readonly
261BE4D0000
heap
page read and write
1CA60AFA000
heap
page read and write
1CA600D1000
heap
page read and write
285EFBE000
stack
page read and write
2235A371000
heap
page read and write
1CA60C7D000
heap
page read and write
1CA60C57000
heap
page read and write
7FFB1E520000
unkown
page readonly
1CA60E2A000
heap
page read and write
1CA611E6000
heap
page read and write
1CA60CC1000
heap
page read and write
18D01CAA000
heap
page read and write
1CA60B23000
heap
page read and write
28BB39C0000
heap
page read and write
1CA60C99000
heap
page read and write
1CA60028000
heap
page read and write
1CA60D6B000
heap
page read and write
23DD1F67000
heap
page read and write
1CA60D74000
heap
page read and write
28BB39D9000
heap
page read and write
1CA60CBD000
heap
page read and write
1CA60102000
heap
page read and write
1CA60CA3000
heap
page read and write
1CA6106F000
heap
page read and write
2235833E000
heap
page read and write
1CA60D2A000
heap
page read and write
7FFAAB5B0000
trusted library allocation
page read and write
1CB021F9000
heap
page read and write
24C88796000
heap
page read and write
1CA60D41000
heap
page read and write
1CA61387000
heap
page read and write
1CA60C8B000
heap
page read and write
1CA60BC5000
heap
page read and write
1CA61125000
heap
page read and write
23DD1F77000
heap
page read and write
1CA60D8E000
heap
page read and write
F226138000
stack
page read and write
1CB021E8000
heap
page read and write
2ABA1874000
heap
page read and write
1CA60CC4000
heap
page read and write
1CA61170000
heap
page read and write
22358341000
heap
page read and write
1CA60137000
heap
page read and write
1CA60E11000
heap
page read and write
1CB01BFE000
heap
page read and write
1CA610F6000
heap
page read and write
1CA60030000
heap
page read and write
1CA60D1C000
heap
page read and write
1CA60EEA000
heap
page read and write
1CA60026000
heap
page read and write
1CA60E4D000
heap
page read and write
1CA611F3000
heap
page read and write
285E973000
stack
page read and write
1CA600F6000
heap
page read and write
1CA60D6B000
heap
page read and write
223582C0000
trusted library allocation
page read and write
1CA6015D000
heap
page read and write
59E0DCF000
stack
page read and write
1CA60B01000
heap
page read and write
1CA60DCD000
heap
page read and write
23DD1F75000
heap
page read and write
1CA6010D000
heap
page read and write
7FFB05A41000
unkown
page execute read
1CB03A85000
heap
page read and write
24C88755000
heap
page read and write
1CA60102000
heap
page read and write
1CA60AF1000
heap
page read and write
1CA611FF000
heap
page read and write
211456F6000
heap
page read and write
1CA611F9000
heap
page read and write
1CB01BE3000
heap
page read and write
1CA61203000
heap
page read and write
1CA61273000
heap
page read and write
1CB01E5A000
heap
page read and write
1CA60D80000
heap
page read and write
1CA6115E000
heap
page read and write
1CA60CAA000
heap
page read and write
1CA61254000
heap
page read and write
22358350000
heap
page read and write
24C8878A000
heap
page read and write
1CA60C97000
heap
page read and write
18D018FB000
heap
page read and write
171803C0000
heap
page read and write
2112CE93000
trusted library allocation
page read and write
1CA60F1D000
heap
page read and write
1CA60C96000
heap
page read and write
1CA60D48000
heap
page read and write
1CA60113000
heap
page read and write
24C887C7000
heap
page read and write
1CA61074000
heap
page read and write
1AAACE90000
heap
page read and write
1CA60130000
heap
page read and write
24C88732000
heap
page read and write
261BE6C0000
heap
page read and write
18D01CA7000
heap
page read and write
7FFB1E545000
unkown
page readonly
1CA610D1000
heap
page read and write
1CA6104D000
heap
page read and write
1AAACCB8000
heap
page read and write
1CA61279000
heap
page read and write
18D01CAE000
heap
page read and write
1CA60D87000
heap
page read and write
1CA6120D000
heap
page read and write
1CA60DA8000
heap
page read and write
2112B577000
heap
page read and write
1CA600D1000
heap
page read and write
1CA60EDC000
heap
page read and write
1CB02209000
heap
page read and write
23DD18A7000
heap
page read and write
1CA60F53000
heap
page read and write
1CA60C97000
heap
page read and write
1CA60F6C000
heap
page read and write
1CA60D69000
heap
page read and write
2112B5AE000
heap
page read and write
1CA6120D000
heap
page read and write
1CA60D20000
heap
page read and write
7FFAAB511000
trusted library allocation
page read and write
1CA60C52000
heap
page read and write
1CA60ED1000
heap
page read and write
1CB01E5E000
heap
page read and write
1CA61179000
heap
page read and write
1AAAE68E000
heap
page read and write
2112CFD0000
heap
page read and write
1CA60AE7000
heap
page read and write
22358327000
heap
page read and write
1CA60AE7000
heap
page read and write
1CA60EAC000
heap
page read and write
171803B0000
heap
page read and write
18D01E08000
heap
page read and write
1CA60044000
heap
page read and write
1CA60BED000
heap
page read and write
24C8877B000
heap
page read and write
1CA60AE0000
heap
page read and write
1CA60E2A000
heap
page read and write
1CA60BED000
heap
page read and write
1CA600C6000
heap
page read and write
1CA6109D000
heap
page read and write
1CA60E4D000
heap
page read and write
1CA60E11000
heap
page read and write
28BB39DA000
heap
page read and write
1CA60F2D000
heap
page read and write
1CA61090000
heap
page read and write
1CB01C1D000
heap
page read and write
2114551C000
heap
page read and write
7FFB1E521000
unkown
page execute read
24C8A5BE000
heap
page read and write
1CA60EDB000
heap
page read and write
7FFB1E520000
unkown
page readonly
1CA60AD5000
heap
page read and write
1CA60BCF000
heap
page read and write
1CA600E4000
heap
page read and write
17180465000
heap
page read and write
1CA60EB9000
heap
page read and write
1CA60EF9000
heap
page read and write
18D01864000
heap
page read and write
1CA60E5B000
heap
page read and write
1CA61031000
heap
page read and write
24C88670000
heap
page read and write
1CA5FFE7000
heap
page read and write
18D018D8000
heap
page read and write
1CA60D77000
heap
page read and write
1CA600F1000
heap
page read and write
1CA60CCB000
heap
page read and write
1CA60C4B000
heap
page read and write
1CA60CC0000
heap
page read and write
1CA60F71000
heap
page read and write
1CA61023000
heap
page read and write
7FFB1E521000
unkown
page execute read
1CA60C8C000
heap
page read and write
C249EA8000
stack
page read and write
1CA61104000
heap
page read and write
1CA6105C000
heap
page read and write
1CA60BB1000
heap
page read and write
1CA60113000
heap
page read and write
1CA5E107000
heap
page read and write
22358336000
heap
page read and write
1CA601FC000
heap
page read and write
24C887B9000
heap
page read and write
223589C5000
heap
page read and write
24C88D0A000
heap
page read and write
1CA60CC3000
heap
page read and write
1CA60C60000
heap
page read and write
1CA60D06000
heap
page read and write
1CA60F9B000
heap
page read and write
1CA60BB3000
heap
page read and write
1CA60113000
heap
page read and write
1CB02207000
heap
page read and write
1CA61099000
heap
page read and write
1CA600C4000
heap
page read and write
1CA61206000
heap
page read and write
1CA60B23000
heap
page read and write
23DD1F6E000
heap
page read and write
1CA611E6000
heap
page read and write
18D03692000
heap
page read and write
2112B5FB000
heap
page read and write
1CA60FA3000
heap
page read and write
1CA60D65000
heap
page read and write
1CA60D0D000
heap
page read and write
7ACE8F4000
stack
page read and write
1CB021F9000
heap
page read and write
1CA60C7E000
heap
page read and write
1CA60ABF000
heap
page read and write
1CA60FE3000
heap
page read and write
1CA60E83000
heap
page read and write
1CA600C4000
heap
page read and write
1CB01BF6000
heap
page read and write
B109CFF000
stack
page read and write
1CA60C3F000
heap
page read and write
1CA60D8E000
heap
page read and write
1CA60EAE000
heap
page read and write
23DD1A0A000
heap
page read and write
1CA60EC4000
heap
page read and write
1CA6108A000
heap
page read and write
24C88D17000
heap
page read and write
1CA60CC2000
heap
page read and write
1CB01BF2000
heap
page read and write
84881E8000
stack
page read and write
1CA60DC3000
heap
page read and write
1CA61049000
heap
page read and write
285F23E000
stack
page read and write
1CB01E52000
heap
page read and write
1CA60C12000
heap
page read and write
23DD18A5000
heap
page read and write
1CA600C8000
heap
page read and write
22D599F5000
heap
page read and write
1CA60BBD000
heap
page read and write
28BB3CA0000
heap
page read and write
1CA60C70000
heap
page read and write
1CA60CA0000
heap
page read and write
1CA610BF000
heap
page read and write
1CA60113000
heap
page read and write
24C88729000
heap
page read and write
1CA600C4000
heap
page read and write
1CA60AD5000
heap
page read and write
1CA61241000
heap
page read and write
1CA60E35000
heap
page read and write
1CA60EE0000
heap
page read and write
1CA600E1000
heap
page read and write
1CA60113000
heap
page read and write
223584C0000
heap
page read and write
223589C7000
heap
page read and write
1CA60E02000
heap
page read and write
1ACDF840000
heap
page read and write
1CA61282000
heap
page read and write
1CA600F7000
heap
page read and write
1CB01BD6000
heap
page read and write
1CA60EC3000
heap
page read and write
1CA60D45000
heap
page read and write
1CA60FC0000
heap
page read and write
18D018E3000
heap
page read and write
24C8872E000
heap
page read and write
1CA60CA9000
heap
page read and write
1CA61028000
heap
page read and write
1CA60D6F000
heap
page read and write
1CA60044000
heap
page read and write
1CA6106D000
heap
page read and write
1CA60CF7000
heap
page read and write
1CA60222000
heap
page read and write
1CA610D3000
heap
page read and write
24C88D0E000
heap
page read and write
7FFAAB362000
trusted library allocation
page read and write
223589C7000
heap
page read and write
1CA60FC0000
heap
page read and write
23DD189F000
heap
page read and write
1CA6114F000
heap
page read and write
1CA60ECC000
heap
page read and write
1CA60BE7000
heap
page read and write
1CA60C90000
heap
page read and write
1E113FE5000
heap
page read and write
1CA60D52000
heap
page read and write
1CA60B15000
heap
page read and write
1CA60EBA000
heap
page read and write
1CA60EB6000
heap
page read and write
1CA60CE1000
heap
page read and write
1CA60FA3000
heap
page read and write
22358353000
heap
page read and write
1CA60B23000
heap
page read and write
1CA60E23000
heap
page read and write
28BB3990000
heap
page read and write
1ACDF8E4000
heap
page read and write
1CA610B9000
heap
page read and write
1CA60B16000
heap
page read and write
1CA60D2D000
heap
page read and write
1CA60130000
heap
page read and write
23DD1810000
heap
page read and write
1CA60BD1000
heap
page read and write
7FF7A19A1000
unkown
page readonly
1CA60D7F000
heap
page read and write
18D01871000
heap
page read and write
22358A00000
heap
page read and write
1CA6110A000
heap
page read and write
24C887AC000
heap
page read and write
1CA600E4000
heap
page read and write
1CA60DBB000
heap
page read and write
24C88D38000
heap
page read and write
23DD1F89000
heap
page read and write
1CA60C74000
heap
page read and write
1CA6113F000
heap
page read and write
1CA600C6000
heap
page read and write
1CA6110D000
heap
page read and write
24C88690000
heap
page read and write
223583F0000
heap
page read and write
22358A0B000
heap
page read and write
7FFAAB680000
trusted library allocation
page read and write
1CA60BC5000
heap
page read and write
1AAAFF17000
heap
page read and write
223589E4000
heap
page read and write
1CA6111D000
heap
page read and write
1CA60EBD000
heap
page read and write
1CA60FCD000
heap
page read and write
223589EB000
heap
page read and write
1CA600C4000
heap
page read and write
23DD188B000
heap
page read and write
1CA611C9000
heap
page read and write
1CA610E0000
heap
page read and write
23DD1884000
heap
page read and write
1CA60EAE000
heap
page read and write
22358358000
heap
page read and write
1CA610D0000
heap
page read and write
1CA60FAB000
heap
page read and write
1CB03A7E000
heap
page read and write
1CA60D87000
heap
page read and write
18D018FC000
heap
page read and write
1CA60DB7000
heap
page read and write
1CB02209000
heap
page read and write
B109C7C000
stack
page read and write
24C88700000
heap
page read and write
24C887C9000
heap
page read and write
2235833C000
heap
page read and write
1CA60AFC000
heap
page read and write
1CA60E0A000
heap
page read and write
27969110000
heap
page read and write
24C8A5BE000
heap
page read and write
1CB01E55000
heap
page read and write
57BAC7F000
stack
page read and write
1CA61079000
heap
page read and write
1CA610FE000
heap
page read and write
1CA60BD1000
heap
page read and write
2861AE40000
heap
page read and write
22358353000
heap
page read and write
1CA60026000
heap
page read and write
1CA600C6000
heap
page read and write
24C8A5B2000
heap
page read and write
1CA60B23000
heap
page read and write
1CA60158000
heap
page read and write
1CA5E267000
heap
page read and write
24C887BC000
heap
page read and write
1CA60E01000
heap
page read and write
7FFB1E542000
unkown
page readonly
23DD3803000
heap
page read and write
223589F8000
heap
page read and write
1CA60CF0000
heap
page read and write
1CA60DBF000
heap
page read and write
1CA60D2D000
heap
page read and write
18D01822000
heap
page read and write
1CA60F1D000
heap
page read and write
1CA60B9C000
heap
page read and write
1CA60AE1000
heap
page read and write
1CA60E08000
heap
page read and write
1CA60CA9000
heap
page read and write
1CA60AE3000
heap
page read and write
1CA6114D000
heap
page read and write
1CA60113000
heap
page read and write
24C8878C000
heap
page read and write
1CA60F05000
heap
page read and write
285F3BC000
stack
page read and write
1CA60EE2000
heap
page read and write
1AAB0332000
heap
page read and write
23DD18A5000
heap
page read and write
1CA60031000
heap
page read and write
1CA60AFD000
heap
page read and write
1CA6013B000
heap
page read and write
1CA60D7F000
heap
page read and write
1CB01E5B000
heap
page read and write
1CA60B16000
heap
page read and write
18D01CAB000
heap
page read and write
24C88D4B000
heap
page read and write
24C88D0B000
heap
page read and write
1CA60AE1000
heap
page read and write
1CA60113000
heap
page read and write
1CA60D2F000
heap
page read and write
1E113CA0000
heap
page read and write
1CA60C65000
heap
page read and write
1CA60113000
heap
page read and write
1CA60D9B000
heap
page read and write
23DD1A07000
heap
page read and write
1CA60BE7000
heap
page read and write
17180460000
heap
page read and write
1CA60CE3000
heap
page read and write
27969115000
heap
page read and write
1CA60D1E000
heap
page read and write
7FFAAB363000
trusted library allocation
page execute and read and write
1CA61198000
heap
page read and write
1CA60E8C000
heap
page read and write
1CA60BE7000
heap
page read and write
1CA60CD3000
heap
page read and write
1CA60DAA000
heap
page read and write
223589C2000
heap
page read and write
23DD1892000
heap
page read and write
1CA60BE7000
heap
page read and write
1CB01C03000
heap
page read and write
1CA60DB4000
heap
page read and write
1CB01C02000
heap
page read and write
1CA60CF2000
heap
page read and write
1CA60E7A000
heap
page read and write
1CA60B23000
heap
page read and write
1CA61243000
heap
page read and write
23DD3804000
heap
page read and write
1CA6124B000
heap
page read and write
23DD3950000
heap
page read and write
1CA600F7000
heap
page read and write
24C8A5B4000
heap
page read and write
24C8875B000
heap
page read and write
1CA6013C000
heap
page read and write
1CA60D62000
heap
page read and write
1CA60CEA000
heap
page read and write
1CA61177000
heap
page read and write
1CA611E6000
heap
page read and write
24C88D28000
heap
page read and write
1CA60ECD000
heap
page read and write
18D01875000
heap
page read and write
22358333000
heap
page read and write
E3911EF000
stack
page read and write
2235A376000
heap
page read and write
1CA6010D000
heap
page read and write
1CA60135000
heap
page read and write
24C88763000
heap
page read and write
1CA610ED000
heap
page read and write
24C886B0000
trusted library allocation
page read and write
1CA60DC0000
heap
page read and write
1CA601FC000
heap
page read and write
1CA60F8C000
heap
page read and write
1CA60F07000
heap
page read and write
23DD18A7000
heap
page read and write
23DD3814000
heap
page read and write
2235833C000
heap
page read and write
1CA60CA5000
heap
page read and write
1CA6010D000
heap
page read and write
C77327F000
stack
page read and write
1CA60FC5000
heap
page read and write
1CA611C5000
heap
page read and write
1CA60B15000
heap
page read and write
24C88D07000
heap
page read and write
1CA60D7D000
heap
page read and write
1CA61051000
heap
page read and write
1CA60113000
heap
page read and write
1CA60044000
heap
page read and write
1CA600FF000
heap
page read and write
27278B15000
heap
page read and write
24C88771000
heap
page read and write
23DD3814000
heap
page read and write
1CA60AE3000
heap
page read and write
1CA6122E000
heap
page read and write
1CA60DB3000
heap
page read and write
22358347000
heap
page read and write
18D0186F000
heap
page read and write
18D01CA4000
heap
page read and write
1CB01BF2000
heap
page read and write
1CA60FFE000
heap
page read and write
1CA600C6000
heap
page read and write
1CA6015C000
heap
page read and write
23DD1A03000
heap
page read and write
1CA60DAF000
heap
page read and write
1CA60C36000
heap
page read and write
18564630000
heap
page read and write
1CA60BD1000
heap
page read and write
1CA6126C000
heap
page read and write
1CA60F94000
heap
page read and write
1CA60AE9000
heap
page read and write
1CA60CA4000
heap
page read and write
1CA60D06000
heap
page read and write
1CA60AB5000
heap
page read and write
261BE420000
heap
page read and write
F2264FF000
stack
page read and write
24C88D38000
heap
page read and write
F22647E000
stack
page read and write
24C88D2A000
heap
page read and write
24C887B8000
heap
page read and write
1CA60CA0000
heap
page read and write
1CA60D25000
heap
page read and write
1CA60E46000
heap
page read and write
2235A37D000
heap
page read and write
1CA60044000
heap
page read and write
1CA60D41000
heap
page read and write
1CA610D3000
heap
page read and write
1CA60EAD000
heap
page read and write
1CA60AE6000
heap
page read and write
1CA60F15000
heap
page read and write
1CA60E94000
heap
page read and write
23DD1F92000
heap
page read and write
18D01810000
heap
page read and write
1CA60E6A000
heap
page read and write
22358353000
heap
page read and write
2112B5B4000
heap
page read and write
223582A0000
heap
page read and write
1CA6002C000
heap
page read and write
1CA60CB4000
heap
page read and write
1CA60BED000
heap
page read and write
7FFB05A62000
unkown
page readonly
1CA5E0C3000
heap
page read and write
24C887BC000
heap
page read and write
1CA60EE4000
heap
page read and write
1CA60130000
heap
page read and write
21145580000
heap
page execute and read and write
1CA6122E000
heap
page read and write
1CA61276000
heap
page read and write
7FF665048000
unkown
page write copy
1CA60D80000
heap
page read and write
1CA60159000
heap
page read and write
1CA60C3B000
heap
page read and write
1CA61072000
heap
page read and write
1CA60B23000
heap
page read and write
22358A01000
heap
page read and write
1CB01BF2000
heap
page read and write
1CA60D15000
heap
page read and write
272788E1000
heap
page read and write
1CA6128E000
heap
page read and write
1CA60BED000
heap
page read and write
1CA60B08000
heap
page read and write
1CA60DA1000
heap
page read and write
1CA60C56000
heap
page read and write
1CA6111D000
heap
page read and write
1CA6010D000
heap
page read and write
1CA60BD3000
heap
page read and write
1CA60B05000
heap
page read and write
7FFB05A40000
unkown
page readonly
2235A373000
heap
page read and write
1CA60C17000
heap
page read and write
18D018AB000
heap
page read and write
285F1BE000
stack
page read and write
1CA60AE6000
heap
page read and write
18D01E1A000
heap
page read and write
24C88D2A000
heap
page read and write
21145749000
heap
page read and write
1CA60D2A000
heap
page read and write
211456F0000
heap
page read and write
1CA60DF5000
heap
page read and write
1CA61065000
heap
page read and write
24C886B0000
trusted library allocation
page read and write
1CA60130000
heap
page read and write
272788CA000
heap
page read and write
1CA60F43000
heap
page read and write
1CB02205000
heap
page read and write
1CA60BD8000
heap
page read and write
1CA61029000
heap
page read and write
1CA60C8F000
heap
page read and write
1CA60B16000
heap
page read and write
1CA61193000
heap
page read and write
1CA60116000
heap
page read and write
2ABA1878000
heap
page read and write
2235833C000
heap
page read and write
1CA60D39000
heap
page read and write
1CA60F15000
heap
page read and write
1CA60BE7000
heap
page read and write
18D01847000
heap
page read and write
18D01827000
heap
page read and write
1CA61282000
heap
page read and write
1CA60D74000
heap
page read and write
22358352000
heap
page read and write
1CA60F6C000
heap
page read and write
24C887C5000
heap
page read and write
1CA610F1000
heap
page read and write
1CA60102000
heap
page read and write
1CA60D76000
heap
page read and write
7FFAAB530000
trusted library allocation
page execute and read and write
1CA60CA3000
heap
page read and write
1CA60BE7000
heap
page read and write
1CA60DB7000
heap
page read and write
1CA5FF81000
heap
page read and write
1CA60EDE000
heap
page read and write
1CA6010D000
heap
page read and write
1CA60BBE000
heap
page read and write
23DD1980000
heap
page read and write
1CA61016000
heap
page read and write
1CA60E94000
heap
page read and write
2ABA1A35000
heap
page read and write
1CA60CB3000
heap
page read and write
1CA60B05000
heap
page read and write
1CB021E4000
heap
page read and write
1CA60E57000
heap
page read and write
23DD1930000
heap
page read and write
7FFAAB410000
trusted library allocation
page read and write
1CA60AF6000
heap
page read and write
1CA60ADD000
heap
page read and write
1CB02202000
heap
page read and write
2112B570000
heap
page read and write
23DD189D000
heap
page read and write
1CA60F2D000
heap
page read and write
1CA60151000
heap
page read and write
1CA60022000
heap
page read and write
1CA6109C000
heap
page read and write
1CB01BF2000
heap
page read and write
1CA60D9F000
heap
page read and write
272788F1000
heap
page read and write
1CA6115B000
heap
page read and write
1CA60D2A000
heap
page read and write
1CA60B23000
heap
page read and write
2114549F000
heap
page read and write
1CA60F57000
heap
page read and write
18564530000
heap
page read and write
1CA600F7000
heap
page read and write
1CA60F1D000
heap
page read and write
1CA60AF1000
heap
page read and write
1CA611CC000
heap
page read and write
7FFAAB550000
trusted library allocation
page execute and read and write
1CA60151000
heap
page read and write
1CA60EEA000
heap
page read and write
1CA60E83000
heap
page read and write
285EE7E000
stack
page read and write
18D01876000
heap
page read and write
223589E8000
heap
page read and write
1CA60113000
heap
page read and write
24C8870B000
heap
page read and write
1CA60CAC000
heap
page read and write
1CA61062000
heap
page read and write
1CA60E96000
heap
page read and write
22358315000
heap
page read and write
1CA6122E000
heap
page read and write
223589DE000
heap
page read and write
1CA61090000
heap
page read and write
1CA611B8000
heap
page read and write
F22657E000
stack
page read and write
24C88D3B000
heap
page read and write
18D01E19000
heap
page read and write
1AAB00F3000
heap
page read and write
24C88737000
heap
page read and write
22358335000
heap
page read and write
18D01CA2000
heap
page read and write
211454A2000
heap
page read and write
22358355000
heap
page read and write
2861AE70000
heap
page read and write
1CA60C94000
heap
page read and write
1E113D40000
heap
page read and write
1CB02200000
heap
page read and write
1CA60FED000
heap
page read and write
1CA600FF000
heap
page read and write
21145515000
heap
page read and write
7FFAAB5E0000
trusted library allocation
page read and write
22358348000
heap
page read and write
1CA60BED000
heap
page read and write
1CA61047000
heap
page read and write
1CA60DD8000
heap
page read and write
1CA60C12000
heap
page read and write
1AAAF5C9000
heap
page read and write
1CA60D2F000
heap
page read and write
1CA60EDD000
heap
page read and write
1CA600FF000
heap
page read and write
1CA61051000
heap
page read and write
1CA600F3000
heap
page read and write
1CA60AAC000
heap
page read and write
1CA60CF9000
heap
page read and write
1CA60CA8000
heap
page read and write
21145780000
heap
page read and write
28BB399B000
heap
page read and write
24C88796000
heap
page read and write
1CA60E86000
heap
page read and write
24C886E0000
heap
page read and write
1CA60130000
heap
page read and write
1CA60AE8000
heap
page read and write
18D0186B000
heap
page read and write
211455E7000
heap
page execute and read and write
24C88D42000
heap
page read and write
1CA600D1000
heap
page read and write
223582C0000
trusted library allocation
page read and write
211454B9000
heap
page read and write
1CA6120E000
heap
page read and write
1CA60BED000
heap
page read and write
1CA610FE000
heap
page read and write
1CA60B9C000
heap
page read and write
1CA600C8000
heap
page read and write
1CA600F7000
heap
page read and write
1CA60D7D000
heap
page read and write
23DD18A7000
heap
page read and write
1CA60EF3000
heap
page read and write
1CA5E1B3000
heap
page read and write
18D01CAA000
heap
page read and write
1CA61055000
heap
page read and write
1CA60D03000
heap
page read and write
F2261BD000
stack
page read and write
1CA61293000
heap
page read and write
1AAAF655000
heap
page read and write
1CA60B0F000
heap
page read and write
1CA60CF3000
heap
page read and write
18D01770000
trusted library allocation
page read and write
1CA60FF8000
heap
page read and write
1CA60BCE000
heap
page read and write
1CB03A77000
heap
page read and write
1CA60D5E000
heap
page read and write
1CA61206000
heap
page read and write
7FFAAB520000
trusted library allocation
page execute and read and write
1CA60031000
heap
page read and write
1CA60116000
heap
page read and write
1CA61090000
heap
page read and write
1CA611FB000
heap
page read and write
1CA60102000
heap
page read and write
1CA611CF000
heap
page read and write
1CA60C55000
heap
page read and write
92B06FE000
stack
page read and write
1CA60D76000
heap
page read and write
22358368000
heap
page read and write
24C88D43000
heap
page read and write
28BB3CA5000
heap
page read and write
23DD1A0E000
heap
page read and write
1CA60FB3000
heap
page read and write
1CA60B9C000
heap
page read and write
1CA60151000
heap
page read and write
1AAAF9F8000
heap
page read and write
1CA60BED000
heap
page read and write
1CA600F6000
heap
page read and write
223589E6000
heap
page read and write
2ABA1A30000
heap
page read and write
1CA61196000
heap
page read and write
1CA61138000
heap
page read and write
1CA60CC4000
heap
page read and write
27968DC0000
heap
page read and write
1CA61114000
heap
page read and write
1CA60139000
heap
page read and write
1CA61023000
heap
page read and write
1CA60AAC000
heap
page read and write
7FF7A1951000
unkown
page execute read
7FFAAB6A0000
trusted library allocation
page read and write
1CA60AD6000
heap
page read and write
23DD18B1000
heap
page read and write
7FFB1E545000
unkown
page readonly
1CA60D30000
heap
page read and write
24C88796000
heap
page read and write
1CA60E83000
heap
page read and write
1CA60044000
heap
page read and write
1CA60C97000
heap
page read and write
1CA60F52000
heap
page read and write
1CA60CC3000
heap
page read and write
1CA60BD1000
heap
page read and write
1CA60BB4000
heap
page read and write
1CA6129E000
heap
page read and write
23DD1A02000
heap
page read and write
1CA6129E000
heap
page read and write
1CA610E3000
heap
page read and write
1CA60AE0000
heap
page read and write
1CA61057000
heap
page read and write
1CA60C34000
heap
page read and write
24C88785000
heap
page read and write
1CA60F3E000
heap
page read and write
1CA610D0000
heap
page read and write
1CA60D0F000
heap
page read and write
1CA600D1000
heap
page read and write
1CA5FFE0000
heap
page read and write
24C88782000
heap
page read and write
1CA611C9000
heap
page read and write
1CA60D20000
heap
page read and write
1CA60F96000
heap
page read and write
18D018B1000
heap
page read and write
1CA61241000
heap
page read and write
1CA60CB0000
heap
page read and write
1CA60130000
heap
page read and write
1CA600E4000
heap
page read and write
1CA60C97000
heap
page read and write
2112CE40000
trusted library allocation
page read and write
1CA60E15000
heap
page read and write
1CA60DFE000
heap
page read and write
79268FF000
stack
page read and write
1CA60116000
heap
page read and write
1CA6119F000
heap
page read and write
211455E0000
heap
page execute and read and write
1CA60F2D000
heap
page read and write
1CA60F5B000
heap
page read and write
1CA60EBD000
heap
page read and write
1CA6111D000
heap
page read and write
1CA60C51000
heap
page read and write
1CA600D1000
heap
page read and write
1CA61111000
heap
page read and write
1CA60D94000
heap
page read and write
1CA6122E000
heap
page read and write
22358333000
heap
page read and write
1CA60135000
heap
page read and write
2112B5CE000
heap
page read and write
1CA60130000
heap
page read and write
FD94DCC000
stack
page read and write
1CA600F7000
heap
page read and write
1CB021D0000
heap
page read and write
223589CE000
heap
page read and write
1CA60D76000
heap
page read and write
1CA600E4000
heap
page read and write
7FFB1E545000
unkown
page readonly
1CA60BC6000
heap
page read and write
1CA61255000
heap
page read and write
1CA600F7000
heap
page read and write
1CA60DFC000
heap
page read and write
1CA60E2A000
heap
page read and write
23DD1F7D000
heap
page read and write
1CA60DA8000
heap
page read and write
1CA60E70000
heap
page read and write
24C88D03000
heap
page read and write
1CA60116000
heap
page read and write
7FF7A198F000
unkown
page read and write
1CA60C12000
heap
page read and write
1CB01E5E000
heap
page read and write
1CA60E80000
heap
page read and write
24C88D1E000
heap
page read and write
7FFB05A56000
unkown
page readonly
1CA60022000
heap
page read and write
1CA611D3000
heap
page read and write
18D018EF000
heap
page read and write
1CA60F04000
heap
page read and write
1CA60C4A000
heap
page read and write
1CA60D89000
heap
page read and write
1CA600F5000
heap
page read and write
1CA60BA0000
heap
page read and write
1CA60CE4000
heap
page read and write
18D01E05000
heap
page read and write
2114574D000
heap
page read and write
18D01E19000
heap
page read and write
2112D321000
heap
page read and write
23DD18A7000
heap
page read and write
1CB021DC000
heap
page read and write
1CA601FC000
heap
page read and write
1CA6122C000
heap
page read and write
1CA6107E000
heap
page read and write
7FFAAB37B000
trusted library allocation
page read and write
1CA60CA5000
heap
page read and write
1CA60E46000
heap
page read and write
C7732FF000
stack
page read and write
22358280000
heap
page read and write
1CA60EB7000
heap
page read and write
1CA60C97000
heap
page read and write
1CA60FC2000
heap
page read and write
1CA600FF000
heap
page read and write
1CA60C70000
heap
page read and write
1CA60B13000
heap
page read and write
1CA60D30000
heap
page read and write
C24A2FF000
stack
page read and write
7FFAAB650000
trusted library allocation
page read and write
1CA60C39000
heap
page read and write
20EE1FC000
stack
page read and write
1CA60E08000
heap
page read and write
1CA60F0A000
heap
page read and write
22358353000
heap
page read and write
7FFAAB5C0000
trusted library allocation
page read and write
1CA601FC000
heap
page read and write
24C887B8000
heap
page read and write
7FF7A19A1000
unkown
page readonly
22D599F0000
heap
page read and write
1CA60C97000
heap
page read and write
1CA6114D000
heap
page read and write
1CA60EEA000
heap
page read and write
1CA60AD6000
heap
page read and write
1CA60D2A000
heap
page read and write
1CA61260000
heap
page read and write
1CA60B0E000
heap
page read and write
18D018F2000
heap
page read and write
1CA61208000
heap
page read and write
7FFB1E521000
unkown
page execute read
1CB01BD9000
heap
page read and write
1CA60BC9000
heap
page read and write
1CA60160000
heap
page read and write
18D018F4000
heap
page read and write
1CA60C15000
heap
page read and write
1CA60C3C000
heap
page read and write
1CA611CE000
heap
page read and write
1CA611C9000
heap
page read and write
23DD18B1000
heap
page read and write
1CA60CC2000
heap
page read and write
2112E091000
trusted library allocation
page read and write
1CA60C21000
heap
page read and write
1CA60C39000
heap
page read and write
18D01872000
heap
page read and write
1CA60D78000
heap
page read and write
1CA600E4000
heap
page read and write
1CA60F15000
heap
page read and write
1CA60D87000
heap
page read and write
7DF4E6060000
trusted library allocation
page execute and read and write
1CA60116000
heap
page read and write
1CA60DB4000
heap
page read and write
22358368000
heap
page read and write
1CA60E51000
heap
page read and write
1CB01BD7000
heap
page read and write
24C88D28000
heap
page read and write
1CA61014000
heap
page read and write
1CA60AEB000
heap
page read and write
22358352000
heap
page read and write
1CA60D2D000
heap
page read and write
18D01E00000
heap
page read and write
1CA60BBF000
heap
page read and write
1CA60CA0000
heap
page read and write
1CA60D0A000
heap
page read and write
1CA611F7000
heap
page read and write
1CA60EEA000
heap
page read and write
18D017A0000
heap
page read and write
1CA60F24000
heap
page read and write
7FFB05A60000
unkown
page read and write
2ABA16E0000
heap
page read and write
18D03691000
heap
page read and write
24C88D23000
heap
page read and write
1CA5FFAB000
heap
page read and write
1CA61203000
heap
page read and write
2235834C000
heap
page read and write
22358321000
heap
page read and write
1CA60EAE000
heap
page read and write
1CA6015E000
heap
page read and write
1CA60AD5000
heap
page read and write
1CA60C9C000
heap
page read and write
1CA61101000
heap
page read and write
1CA60CD7000
heap
page read and write
1CA60C94000
heap
page read and write
18D01E19000
heap
page read and write
1CA60D23000
heap
page read and write
7FF6649A0000
unkown
page readonly
1CA60116000
heap
page read and write
7FFAAB610000
trusted library allocation
page read and write
1AAB66D0000
heap
page read and write
7FFAAB670000
trusted library allocation
page read and write
1CA5E1B1000
heap
page read and write
1CA6108A000
heap
page read and write
1CA60D98000
heap
page read and write
1CB01B40000
heap
page read and write
1CA60F5C000
heap
page read and write
24C88D1C000
heap
page read and write
1CA60CA5000
heap
page read and write
1AAAF929000
heap
page read and write
1CA60B23000
heap
page read and write
7FFB1E540000
unkown
page read and write
1CA60BED000
heap
page read and write
1CA60BD8000
heap
page read and write
1CA60D33000
heap
page read and write
1CA60D8E000
heap
page read and write
1CA60E96000
heap
page read and write
A3C55EF000
stack
page read and write
1CA600E4000
heap
page read and write
1CA60CA2000
heap
page read and write
1CA60059000
heap
page read and write
1CA60B08000
heap
page read and write
1CA60CAD000
heap
page read and write
1AAAF5DF000
heap
page read and write
1CA60DB7000
heap
page read and write
1CA60F45000
heap
page read and write
1CA60C65000
heap
page read and write
285F137000
stack
page read and write
1CA6106D000
heap
page read and write
1CA600D1000
heap
page read and write
1CA60C91000
heap
page read and write
1CA60D8E000
heap
page read and write
261BE440000
heap
page read and write
22358341000
heap
page read and write
1CA60D40000
heap
page read and write
223584CD000
heap
page read and write
1CA60C9B000
heap
page read and write
22358358000
heap
page read and write
1CA60FB8000
heap
page read and write
1CA60160000
heap
page read and write
18D01730000
heap
page read and write
1CA60F0D000
heap
page read and write
223589F8000
heap
page read and write
1CA61159000
heap
page read and write
7FF7A197B000
unkown
page readonly
1CA60DD5000
heap
page read and write
1CA60D4E000
heap
page read and write
1CA60EBA000
heap
page read and write
C7730FE000
stack
page read and write
1CA60DB3000
heap
page read and write
1CA60D6C000
heap
page read and write
1CA611F9000
heap
page read and write
1CA60022000
heap
page read and write
7FF66507E000
unkown
page readonly
24C88D4A000
heap
page read and write
1CA60CAB000
heap
page read and write
1CA60ED1000
heap
page read and write
1CA60D81000
heap
page read and write
1CA61215000
heap
page read and write
1CA601FC000
heap
page read and write
1CA60CE6000
heap
page read and write
223589CB000
heap
page read and write
1CA60CC2000
heap
page read and write
1CA60CF8000
heap
page read and write
1CA60AAC000
heap
page read and write
1CA60DB3000
heap
page read and write
1CA60C53000
heap
page read and write
1CA610FB000
heap
page read and write
7FFB1E542000
unkown
page readonly
1CB01E5A000
heap
page read and write
1CA60C9B000
heap
page read and write
1CA60060000
heap
page read and write
23DD1A0A000
heap
page read and write
27968E30000
heap
page read and write
2112CFD5000
heap
page read and write
18D018D1000
heap
page read and write
1CA60CBE000
heap
page read and write
1CA60AF5000
heap
page read and write
1CA60ABB000
heap
page read and write
1CA60E15000
heap
page read and write
18D018FC000
heap
page read and write
1AAAF927000
heap
page read and write
2235A384000
heap
page read and write
23DD1893000
heap
page read and write
24C887BC000
heap
page read and write
1CB03A7E000
heap
page read and write
1CA611CE000
heap
page read and write
24C8A5B0000
heap
page read and write
1CA60CED000
heap
page read and write
1CA601FC000
heap
page read and write
1CA60BE7000
heap
page read and write
1CA61090000
heap
page read and write
1CA61014000
heap
page read and write
1CA61029000
heap
page read and write
1CB01C03000
heap
page read and write
1CA60B01000
heap
page read and write
1CA60102000
heap
page read and write
24C88772000
heap
page read and write
1CA60D80000
heap
page read and write
1CA60B16000
heap
page read and write
23DD1A07000
heap
page read and write
18D018E1000
heap
page read and write
1CA6010D000
heap
page read and write
1CA60C75000
heap
page read and write
1CB021FF000
heap
page read and write
1CA60EE7000
heap
page read and write
1CA60116000
heap
page read and write
1CA61206000
heap
page read and write
18D01CA7000
heap
page read and write
1CA60C34000
heap
page read and write
223589F8000
heap
page read and write
1CA60DA1000
heap
page read and write
1CB021E3000
heap
page read and write
7FF7A199E000
unkown
page readonly
1CA610F1000
heap
page read and write
1CA61052000
heap
page read and write
1CA60BE7000
heap
page read and write
1CA60EEB000
heap
page read and write
1CA6117D000
heap
page read and write
1CB01C0C000
heap
page read and write
1CB01C18000
heap
page read and write
1CA600FF000
heap
page read and write
1CA6127D000
heap
page read and write
223589F8000
heap
page read and write
285F2BA000
stack
page read and write
1CA60D74000
heap
page read and write
1CA60C48000
heap
page read and write
23DD1F99000
heap
page read and write
7FF7A1994000
unkown
page read and write
22358316000
heap
page read and write
211454BB000
heap
page read and write
22358321000
heap
page read and write
17180470000
heap
page read and write
1CA60BE7000
heap
page read and write
1CA60DF4000
heap
page read and write
1CA611FF000
heap
page read and write
1CA60EDB000
heap
page read and write
1CA60B02000
heap
page read and write
7FFB1E540000
unkown
page read and write
24C88D07000
heap
page read and write
24C88D42000
heap
page read and write
1CA601FC000
heap
page read and write
1CA61152000
heap
page read and write
1CA60ADD000
heap
page read and write
1CB03A73000
heap
page read and write
1CA60DB4000
heap
page read and write
1CA6119F000
heap
page read and write
27278B10000
heap
page read and write
223581A0000
heap
page read and write
1CA60F95000
heap
page read and write
1CA60E3A000
heap
page read and write
1CA600C8000
heap
page read and write
23DD1891000
heap
page read and write
1CA60EEA000
heap
page read and write
2861AE77000
heap
page read and write
1CA60D0A000
heap
page read and write
1CA600C4000
heap
page read and write
285ECFE000
stack
page read and write
1CA60DE3000
heap
page read and write
1CA60E5D000
heap
page read and write
1CA60B23000
heap
page read and write
59E107F000
stack
page read and write
1CA60E97000
heap
page read and write
1CA61210000
heap
page read and write
1CA610BD000
heap
page read and write
1CA60C3C000
heap
page read and write
1CA61095000
heap
page read and write
1CA60CA9000
heap
page read and write
1CA60F7D000
heap
page read and write
18D018E6000
heap
page read and write
272788F9000
heap
page read and write
1CA60F16000
heap
page read and write
1CA60DC7000
heap
page read and write
1CA600C4000
heap
page read and write
1AAAFA36000
heap
page read and write
1CA60B23000
heap
page read and write
1CA60E26000
heap
page read and write
1CA60EEB000
heap
page read and write
23DD1871000
heap
page read and write
28BB3B60000
heap
page read and write
1CA60135000
heap
page read and write
1CA61377000
heap
page read and write
1CA60CC1000
heap
page read and write
23DD1730000
heap
page read and write
1CA610DE000
heap
page read and write
1CA6015B000
heap
page read and write
1CA60FC2000
heap
page read and write
285F0B8000
stack
page read and write
22D597F0000
heap
page read and write
223589EB000
heap
page read and write
1CA61184000
heap
page read and write
1CA610FB000
heap
page read and write
1CA60BB4000
heap
page read and write
CE8E6FF000
stack
page read and write
1CB01E5A000
heap
page read and write
1CA60AE9000
heap
page read and write
23DD1A00000
heap
page read and write
18D01849000
heap
page read and write
1CA60EDE000
heap
page read and write
1CB01BB7000
heap
page read and write
1CA600FF000
heap
page read and write
1CA60E03000
heap
page read and write
1CA60102000
heap
page read and write
1CA60BB1000
heap
page read and write
23DD1F95000
heap
page read and write
1CA6104D000
heap
page read and write
1CA60AF7000
heap
page read and write
1CA60CC2000
heap
page read and write
23DD1884000
heap
page read and write
2112EFA8000
trusted library allocation
page read and write
1CA6010D000
heap
page read and write
1CA600C6000
heap
page read and write
59E117F000
stack
page read and write
7FFAAB5A0000
trusted library allocation
page read and write
1CA60BED000
heap
page read and write
1CA60F9B000
heap
page read and write
1CA61085000
heap
page read and write
1CA60EF9000
heap
page read and write
1CA60FB9000
heap
page read and write
1CA60FF7000
heap
page read and write
1CA60D8E000
heap
page read and write
1CA600C6000
heap
page read and write
1CB01B60000
trusted library allocation
page read and write
1CA600F7000
heap
page read and write
1CA60F8E000
heap
page read and write
1CA60F5F000
heap
page read and write
2235833C000
heap
page read and write
1CA60F29000
heap
page read and write
1CA60BD8000
heap
page read and write
1CA600C8000
heap
page read and write
1CA60061000
heap
page read and write
1CA60E99000
heap
page read and write
27278909000
heap
page read and write
1CA60AFB000
heap
page read and write
1CA60116000
heap
page read and write
23DD1895000
heap
page read and write
1CA60CFE000
heap
page read and write
24C88D48000
heap
page read and write
18D01862000
heap
page read and write
1CA60C22000
heap
page read and write
1CA600D1000
heap
page read and write
24C88D3A000
heap
page read and write
1CA60116000
heap
page read and write
1CA61262000
heap
page read and write
1CA60C41000
heap
page read and write
1CA60CF6000
heap
page read and write
1CA60FE6000
heap
page read and write
18D018E1000
heap
page read and write
1CA61223000
heap
page read and write
1CA601FC000
heap
page read and write
24C88D3C000
heap
page read and write
23DD3800000
heap
page read and write
1CA611E2000
heap
page read and write
1CB01BD6000
heap
page read and write
1CA600FF000
heap
page read and write
1CA60ED6000
heap
page read and write
1CA60BE7000
heap
page read and write
1CA60E17000
heap
page read and write
18D01E01000
heap
page read and write
22358356000
heap
page read and write
92B05FF000
unkown
page read and write
92B04FC000
stack
page read and write
1CA60FD5000
heap
page read and write
1CA60EC6000
heap
page read and write
1CA60ABF000
heap
page read and write
1CA60AFD000
heap
page read and write
1CA60160000
heap
page read and write
1CA60E0A000
heap
page read and write
1CA61051000
heap
page read and write
1CA600FF000
heap
page read and write
1CA601FC000
heap
page read and write
1CA60138000
heap
page read and write
18D0184F000
heap
page read and write
1CA60E7B000
heap
page read and write
1CA60CBE000
heap
page read and write
18D01DFE000
heap
page read and write
1CA60E1B000
heap
page read and write
1CA600D5000
heap
page read and write
1CA600FF000
heap
page read and write
23DD1F72000
heap
page read and write
1CA60BED000
heap
page read and write
7FFB1E536000
unkown
page readonly
1CA60E6A000
heap
page read and write
223582F7000
heap
page read and write
1CA61269000
heap
page read and write
223583E0000
trusted library allocation
page read and write
1CA60D9F000
heap
page read and write
2861AE7B000
heap
page read and write
1CA60CB5000
heap
page read and write
1CA60C51000
heap
page read and write
2112B5F6000
heap
page read and write
C24A37F000
stack
page read and write
22358A05000
heap
page read and write
1CA60C6A000
heap
page read and write
1CA61111000
heap
page read and write
2112CE50000
heap
page readonly
27968E3B000
heap
page read and write
1E113C80000
heap
page read and write
1CA60D2B000
heap
page read and write
2235831B000
heap
page read and write
1CA61090000
heap
page read and write
18D018E7000
heap
page read and write
22358328000
heap
page read and write
1CA60137000
heap
page read and write
23DD18A6000
heap
page read and write
1CA610D1000
heap
page read and write
18D01E05000
heap
page read and write
2112B4D0000
heap
page read and write
1CA60130000
heap
page read and write
23DD1F6C000
heap
page read and write
1CA611BB000
heap
page read and write
1CA60030000
heap
page read and write
1AAAF08E000
heap
page read and write
1CA610FD000
heap
page read and write
1CA60B23000
heap
page read and write
1CA60F28000
heap
page read and write
1CA60AFD000
heap
page read and write
1CA60BED000
heap
page read and write
1CA611E9000
heap
page read and write
23DD1A04000
heap
page read and write
18D01892000
heap
page read and write
1CA60CA3000
heap
page read and write
1AAAFEDF000
heap
page read and write
223589CA000
heap
page read and write
1CA60D40000
heap
page read and write
1CA60FB0000
heap
page read and write
1CA60CDA000
heap
page read and write
1CA60D7D000
heap
page read and write
1CA60CB9000
heap
page read and write
23DD1899000
heap
page read and write
1AAB02E2000
heap
page read and write
285FD8E000
stack
page read and write
1CA60030000
heap
page read and write
1CA60CC7000
heap
page read and write
1CB01E57000
heap
page read and write
7FFAAB660000
trusted library allocation
page read and write
1CA60DA9000
heap
page read and write
1CA60161000
heap
page read and write
285E9FE000
unkown
page read and write
22D597FA000
heap
page read and write
1CA6107E000
heap
page read and write
2112ECCC000
trusted library allocation
page read and write
1CA6107E000
heap
page read and write
1CA60DF2000
heap
page read and write
7FFAAB630000
trusted library allocation
page read and write
7FF7A1950000
unkown
page readonly
1CA60DDE000
heap
page read and write
1CA611E1000
heap
page read and write
24C88786000
heap
page read and write
1CA61051000
heap
page read and write
1CA60F4B000
heap
page read and write
1CA60102000
heap
page read and write
1CA60E4F000
heap
page read and write
1CA60F3E000
heap
page read and write
1CA6107B000
heap
page read and write
1CA60F2A000
heap
page read and write
1CA60151000
heap
page read and write
24C887AC000
heap
page read and write
23DD189D000
heap
page read and write
1CB01A40000
heap
page read and write
285FE0A000
stack
page read and write
1CA60ECD000
heap
page read and write
23DD18AB000
heap
page read and write
1CA60B23000
heap
page read and write
CE8E5FF000
unkown
page read and write
2235A384000
heap
page read and write
1E113D10000
heap
page read and write
1CA610FB000
heap
page read and write
1CA60D36000
heap
page read and write
1CA60E35000
heap
page read and write
1CA60F9B000
heap
page read and write
1CA60DB3000
heap
page read and write
1CA60044000
heap
page read and write
1CA5E267000
heap
page read and write
1CA600F3000
heap
page read and write
7FFAAB5D0000
trusted library allocation
page read and write
2112F06E000
trusted library allocation
page read and write
1CA611B9000
heap
page read and write
1CA61074000
heap
page read and write
7FFAAB590000
trusted library allocation
page read and write
1CA60C49000
heap
page read and write
D710AFC000
stack
page read and write
1CA60F6F000
heap
page read and write
1CA600C4000
heap
page read and write
1CA60BE7000
heap
page read and write
272789C0000
heap
page read and write
2112B550000
heap
page read and write
1CA60113000
heap
page read and write
1AAB032E000
heap
page read and write
1ACDF8F8000
heap
page read and write
1CA6128E000
heap
page read and write
1CA6010D000
heap
page read and write
1CA60AD5000
heap
page read and write
1CA60EDB000
heap
page read and write
1CB021D8000
heap
page read and write
23DD380D000
heap
page read and write
23DD3814000
heap
page read and write
1CA610D0000
heap
page read and write
1CA61090000
heap
page read and write
1CA60BB6000
heap
page read and write
1CA60C84000
heap
page read and write
223589CA000
heap
page read and write
1CA6104D000
heap
page read and write
18D01861000
heap
page read and write
1CA60C17000
heap
page read and write
1CA6126B000
heap
page read and write
1CA61047000
heap
page read and write
1CA60C92000
heap
page read and write
2235A374000
heap
page read and write
1CA60CCC000
heap
page read and write
1CA60CEA000
heap
page read and write
1CA60D0D000
heap
page read and write
1CA60B08000
heap
page read and write
285EDFE000
stack
page read and write
1CA61184000
heap
page read and write
1CA6129E000
heap
page read and write
1CA6102D000
heap
page read and write
E3910EC000
stack
page read and write
1CA60C12000
heap
page read and write
1CA61065000
heap
page read and write
1ACDF8E7000
heap
page read and write
1CA610AE000
heap
page read and write
7FFAAB36D000
trusted library allocation
page execute and read and write
18D01862000
heap
page read and write
1CA60E9C000
heap
page read and write
1CB01E50000
heap
page read and write
18D01855000
heap
page read and write
23DD1F8A000
heap
page read and write
1CA60DB3000
heap
page read and write
1CA60DBA000
heap
page read and write
1AAAFF05000
heap
page read and write
1CA60E26000
heap
page read and write
1CA60FF2000
heap
page read and write
7FF6649A1000
unkown
page execute read
1CA60C1E000
heap
page read and write
18D0184F000
heap
page read and write
1CA60151000
heap
page read and write
1CA61255000
heap
page read and write
1CA61055000
heap
page read and write
1CA61228000
heap
page read and write
1CA600FF000
heap
page read and write
1CA601FC000
heap
page read and write
1CA60BE7000
heap
page read and write
18D01856000
heap
page read and write
1CA60B15000
heap
page read and write
2ABA1888000
heap
page read and write
7FFB1E542000
unkown
page readonly
1CA61217000
heap
page read and write
18D01845000
heap
page read and write
1CA60FA8000
heap
page read and write
2114574B000
heap
page read and write
1CB01BD6000
heap
page read and write
1CA60E34000
heap
page read and write
23DD1F89000
heap
page read and write
18D01770000
trusted library allocation
page read and write
22358A08000
heap
page read and write
1CA60ECE000
heap
page read and write
7FFAAB41C000
trusted library allocation
page execute and read and write
1CA60101000
heap
page read and write
1CA61090000
heap
page read and write
2113D461000
trusted library allocation
page read and write
1CA601FC000
heap
page read and write
1CA60BE7000
heap
page read and write
285EEFF000
stack
page read and write
1CA60BC5000
heap
page read and write
2ABA17C0000
heap
page read and write
1CA60C94000
heap
page read and write
1ACDF8E0000
heap
page read and write
59E0D48000
stack
page read and write
1CA60151000
heap
page read and write
1CA60CC1000
heap
page read and write
1CA60C94000
heap
page read and write
1CA60F1D000
heap
page read and write
1CA60FF3000
heap
page read and write
1CA60BD8000
heap
page read and write
1CA60EC9000
heap
page read and write
261BE340000
heap
page read and write
1CA60E7B000
heap
page read and write
18D01E02000
heap
page read and write
24C88737000
heap
page read and write
24C8A5B1000
heap
page read and write
1CA610FB000
heap
page read and write
1CA60BC5000
heap
page read and write
1CA600F7000
heap
page read and write
22D597D0000
heap
page read and write
1CA600C6000
heap
page read and write
1CA61072000
heap
page read and write
18D01845000
heap
page read and write
1CA60BED000
heap
page read and write
1CA60FA8000
heap
page read and write
1CA600C6000
heap
page read and write
1CA60026000
heap
page read and write
18D0186E000
heap
page read and write
1CA60CA6000
heap
page read and write
7FFB1E536000
unkown
page readonly
1CA60EC2000
heap
page read and write
1CA6013C000
heap
page read and write
1CA60102000
heap
page read and write
18D0187B000
heap
page read and write
24C88782000
heap
page read and write
1CA60C17000
heap
page read and write
1CA60AFD000
heap
page read and write
1CA60F3E000
heap
page read and write
1CA6121C000
heap
page read and write
1CA60222000
heap
page read and write
1CA6013C000
heap
page read and write
1CA60CB9000
heap
page read and write
1CA60D39000
heap
page read and write
1CA60B23000
heap
page read and write
1CB01E80000
heap
page read and write
18D017D0000
heap
page read and write
1CA60EDE000
heap
page read and write
1CA60C54000
heap
page read and write
223589F8000
heap
page read and write
1CA610FE000
heap
page read and write
1CA60161000
heap
page read and write
23DD1884000
heap
page read and write
18D0369E000
heap
page read and write
1CA60E0B000
heap
page read and write
23DD380E000
heap
page read and write
1CA60E1A000
heap
page read and write
7FFAAB5F0000
trusted library allocation
page read and write
22358345000
heap
page read and write
18D017D5000
heap
page read and write
1CB01B60000
trusted library allocation
page read and write
1CB021F9000
heap
page read and write
1CA60EEB000
heap
page read and write
1CA600C4000
heap
page read and write
18D018FB000
heap
page read and write
1CA61005000
heap
page read and write
1CA60F34000
heap
page read and write
1CA60F8E000
heap
page read and write
1CA60D0D000
heap
page read and write
1CA600C8000
heap
page read and write
24C8878C000
heap
page read and write
1CA600C4000
heap
page read and write
2112B582000
heap
page read and write
1CA60C8D000
heap
page read and write
1CA60FE3000
heap
page read and write
1CA60CD5000
heap
page read and write
1CA60BED000
heap
page read and write
223589FD000
heap
page read and write
1CA60C6E000
heap
page read and write
1CA60E11000
heap
page read and write
18D01E1C000
heap
page read and write
18D01DF8000
heap
page read and write
1CA60C60000
heap
page read and write
1CB03A85000
heap
page read and write
1CB021E4000
heap
page read and write
24C88D2A000
heap
page read and write
1CA61051000
heap
page read and write
1CA60BAC000
heap
page read and write
1CA60116000
heap
page read and write
1CA6013B000
heap
page read and write
1CB01E53000
heap
page read and write
1CA60102000
heap
page read and write
1CA60BC5000
heap
page read and write
7FFAAB446000
trusted library allocation
page execute and read and write
1CA600E4000
heap
page read and write
1CA600FF000
heap
page read and write
1CA61090000
heap
page read and write
1CA60130000
heap
page read and write
1CA60BED000
heap
page read and write
848847E000
stack
page read and write
1CA60C9C000
heap
page read and write
2114550B000
heap
page read and write
1CA60D2B000
heap
page read and write
1CA60C97000
heap
page read and write
1CA60CED000
heap
page read and write
23DD1950000
trusted library allocation
page read and write
1CA600E4000
heap
page read and write
18D0187B000
heap
page read and write
24C88759000
heap
page read and write
1CA60D36000
heap
page read and write
1CB01B20000
heap
page read and write
23DD18A5000
heap
page read and write
1CA60D40000
heap
page read and write
1CA60C73000
heap
page read and write
18D036A4000
heap
page read and write
18D0369E000
heap
page read and write
1CA60CDC000
heap
page read and write
24C88785000
heap
page read and write
1CA60D7C000
heap
page read and write
1CA60FED000
heap
page read and write
24C88D24000
heap
page read and write
1CA600F2000
heap
page read and write
18D018FC000
heap
page read and write
1CA61213000
heap
page read and write
1CB021FF000
heap
page read and write
1CA610D3000
heap
page read and write
1CA600F1000
heap
page read and write
1CA60FA6000
heap
page read and write
1CA5E238000
heap
page read and write
24C88791000
heap
page read and write
1CA60BED000
heap
page read and write
223589D7000
heap
page read and write
1CA601FC000
heap
page read and write
1CA60EEA000
heap
page read and write
1CA60B9C000
heap
page read and write
1CA6010D000
heap
page read and write
1CA60C12000
heap
page read and write
1CA6010D000
heap
page read and write
1CA610FF000
heap
page read and write
1CA60AFA000
heap
page read and write
1CA601FC000
heap
page read and write
2ABA1A40000
heap
page read and write
1CA611C4000
heap
page read and write
27968E37000
heap
page read and write
1CA60CA0000
heap
page read and write
23DD1950000
trusted library allocation
page read and write
22358344000
heap
page read and write
2112B555000
heap
page read and write
1CA61154000
heap
page read and write
B109D7F000
stack
page read and write
1CA60F6C000
heap
page read and write
1CA6122E000
heap
page read and write
18D01CA3000
heap
page read and write
18D01866000
heap
page read and write
1CA60DD9000
heap
page read and write
1AAAFE9D000
heap
page read and write
1CA60EF5000
heap
page read and write
1CA60FD0000
heap
page read and write
1AAACDB0000
heap
page read and write
1CA60DEC000
heap
page read and write
1CA60113000
heap
page read and write
24C88754000
heap
page read and write
1CA60FBA000
heap
page read and write
1CA60C4A000
heap
page read and write
1CA60D6C000
heap
page read and write
1CA60C32000
heap
page read and write
1CA60D8F000
heap
page read and write
1CA60EAE000
heap
page read and write
1CA60EF5000
heap
page read and write
223589C4000
heap
page read and write
1CA6109C000
heap
page read and write
2112CED0000
trusted library allocation
page read and write
1CA60B15000
heap
page read and write
24C8878C000
heap
page read and write
1CA60E7A000
heap
page read and write
1CA6010D000
heap
page read and write
1CA61269000
heap
page read and write
1CA61148000
heap
page read and write
1CA61203000
heap
page read and write
1CA60FC2000
heap
page read and write
1AAAFB38000
heap
page read and write
23DD1AD0000
heap
page read and write
1CA60E9A000
heap
page read and write
1CB01C1D000
heap
page read and write
1CA611E6000
heap
page read and write
1CA6120D000
heap
page read and write
27968DE0000
heap
page read and write
1CA610A4000
heap
page read and write
2113D470000
trusted library allocation
page read and write
18D01770000
trusted library allocation
page read and write
24C8870D000
heap
page read and write
24C88D1C000
heap
page read and write
1CA60D2F000
heap
page read and write
1CA61046000
heap
page read and write
1CA60F96000
heap
page read and write
1CA60C7C000
heap
page read and write
1E113EE0000
heap
page read and write
1CA60FED000
heap
page read and write
1CA60044000
heap
page read and write
1CA60C21000
heap
page read and write
1CA60FED000
heap
page read and write
23DD1A0A000
heap
page read and write
1CA60BED000
heap
page read and write
1CA60BE7000
heap
page read and write
1ACDF880000
heap
page read and write
1CA6105A000
heap
page read and write
1CA6002B000
heap
page read and write
18D0369E000
heap
page read and write
1CA61373000
heap
page read and write
24C88D05000
heap
page read and write
23DD186B000
heap
page read and write
1CA60BED000
heap
page read and write
1CA60E1B000
heap
page read and write
1CA600F3000
heap
page read and write
1CA60D52000
heap
page read and write
272787E0000
heap
page read and write
1CA6010D000
heap
page read and write
1CA60EE1000
heap
page read and write
1CA5E0CF000
heap
page read and write
1CA61005000
heap
page read and write
24C88782000
heap
page read and write
23DD1843000
heap
page read and write
1CA60ABF000
heap
page read and write
28BB3BA0000
heap
page read and write
1CA610A1000
heap
page read and write
1CA610E0000
heap
page read and write
1CA61215000
heap
page read and write
1CA60BA0000
heap
page read and write
1CA60FB8000
heap
page read and write
1AAAFAB8000
heap
page read and write
1CA60C74000
heap
page read and write
18D01874000
heap
page read and write
22358319000
heap
page read and write
1CA6002B000
heap
page read and write
1CA60D77000
heap
page read and write
1CA60C70000
heap
page read and write
2113D4D0000
trusted library allocation
page read and write
1CA5E0EC000
heap
page read and write
1CA6115B000
heap
page read and write
1CA60113000
heap
page read and write
1CA60113000
heap
page read and write
1CA61141000
heap
page read and write
1CB01BFB000
heap
page read and write
23DD1ADE000
heap
page read and write
211459F0000
heap
page read and write
1CA60EBA000
heap
page read and write
24C88D45000
heap
page read and write
1CA60DE4000
heap
page read and write
2235A37E000
heap
page read and write
1CA60BB7000
heap
page read and write
1CA60CB1000
heap
page read and write
24C8878C000
heap
page read and write
1CA60D69000
heap
page read and write
1CA611BB000
heap
page read and write
1CA600C8000
heap
page read and write
22D597A0000
heap
page read and write
1CB01BFB000
heap
page read and write
1CA60044000
heap
page read and write
1CA60FC2000
heap
page read and write
23DD1F89000
heap
page read and write
57BACFF000
stack
page read and write
1CA60B23000
heap
page read and write
1CA60D77000
heap
page read and write
1CA6013A000
heap
page read and write
1CA60BED000
heap
page read and write
1CA600F3000
heap
page read and write
2112D691000
trusted library allocation
page read and write
28BB39C4000
heap
page read and write
1CA60C21000
heap
page read and write
1CA60C94000
heap
page read and write
1CA60F6C000
heap
page read and write
1CA600E6000
heap
page read and write
1CA60FBF000
heap
page read and write
21145610000
heap
page read and write
1CA60E1B000
heap
page read and write
1CB01BB2000
heap
page read and write
1CB021E1000
heap
page read and write
1CA60FAD000
heap
page read and write
1CA61099000
heap
page read and write
1CA60F95000
heap
page read and write
FD950FF000
unkown
page read and write
17180477000
heap
page read and write
1CA61193000
heap
page read and write
1CA60F52000
heap
page read and write
1CA60EDF000
heap
page read and write
1CA60EA5000
heap
page read and write
24C8879C000
heap
page read and write
1CA60EEA000
heap
page read and write
1CA6126D000
heap
page read and write
1CA61223000
heap
page read and write
2112B65F000
heap
page read and write
18D017DB000
heap
page read and write
18D03696000
heap
page read and write
18D036A4000
heap
page read and write
1CB03A71000
heap
page read and write
1CA600F7000
heap
page read and write
1CA61208000
heap
page read and write
24C88D4B000
heap
page read and write
1CA60C6B000
heap
page read and write
1CA60AE3000
heap
page read and write
1CA600C6000
heap
page read and write
1CA60FA7000
heap
page read and write
1CA60026000
heap
page read and write
1CA60E26000
heap
page read and write
28BB39B0000
heap
page read and write
C773078000
stack
page read and write
2112B530000
heap
page read and write
1CA6117F000
heap
page read and write
24C88D24000
heap
page read and write
1AAB0390000
heap
page read and write
1CA61273000
heap
page read and write
1CA6010D000
heap
page read and write
1CA60C95000
heap
page read and write
1CA60D67000
heap
page read and write
1CA60BE7000
heap
page read and write
1CA60ED1000
heap
page read and write
7FFB1E540000
unkown
page read and write
1CA6010F000
heap
page read and write
1CA60CB9000
heap
page read and write
23DD1892000
heap
page read and write
1CA60BD8000
heap
page read and write
1CA6117F000
heap
page read and write
1CA60022000
heap
page read and write
1CA60D40000
heap
page read and write
18D01CAE000
heap
page read and write
223589DC000
heap
page read and write
1CA60D04000
heap
page read and write
1ACDF8F7000
heap
page read and write
7FFAAB364000
trusted library allocation
page read and write
1CA60BC5000
heap
page read and write
2ABA184B000
heap
page read and write
223583E0000
trusted library allocation
page read and write
1ACDF8B0000
heap
page read and write
1CA60BAA000
heap
page read and write
CA5D18F000
stack
page read and write
1CA60130000
heap
page read and write
1CA60DB3000
heap
page read and write
1CA611D3000
heap
page read and write
1CA60CBF000
heap
page read and write
1CA61257000
heap
page read and write
1CA60D5E000
heap
page read and write
1CA60102000
heap
page read and write
1CA60E2A000
heap
page read and write
23DD1F73000
heap
page read and write
1CA60E60000
heap
page read and write
1CA60DA4000
heap
page read and write
18D036A4000
heap
page read and write
1CA60B27000
heap
page read and write
18D018E1000
heap
page read and write
1CA61087000
heap
page read and write
1CA60AE6000
heap
page read and write
24C8A5C4000
heap
page read and write
1CA60B23000
heap
page read and write
1CA60C1C000
heap
page read and write
1AAB66C0000
heap
page read and write
23DD189B000
heap
page read and write
1CA60E56000
heap
page read and write
CE8E4FC000
stack
page read and write
1CA60E6C000
heap
page read and write
23DD188B000
heap
page read and write
1CA60E7E000
heap
page read and write
1CA60B05000
heap
page read and write
23DD1871000
heap
page read and write
1CA60E9A000
heap
page read and write
1CA61014000
heap
page read and write
1CA600F6000
heap
page read and write
1CA60BC9000
heap
page read and write
1CA60D76000
heap
page read and write
1CA60AFC000
heap
page read and write
7FF7A1951000
unkown
page execute read
1CA60E7E000
heap
page read and write
18D0188B000
heap
page read and write
1CB01C10000
heap
page read and write
1CA60D1C000
heap
page read and write
24C88756000
heap
page read and write
1CA600A5000
heap
page read and write
23DD1896000
heap
page read and write
1CA60DCE000
heap
page read and write
7FF7A199E000
unkown
page readonly
1CA60C25000
heap
page read and write
18D018D8000
heap
page read and write
59E11FF000
stack
page read and write
1CA60D0D000
heap
page read and write
23DD1F68000
heap
page read and write
1CA60DD5000
heap
page read and write
1CA61136000
heap
page read and write
1CB03A70000
heap
page read and write
1CA610C8000
heap
page read and write
1CA60C21000
heap
page read and write
18D018EF000
heap
page read and write
1CA60BED000
heap
page read and write
18D018FB000
heap
page read and write
1CA60AF6000
heap
page read and write
1CA60F5C000
heap
page read and write
1CA6129E000
heap
page read and write
1CA61090000
heap
page read and write
18D03694000
heap
page read and write
7FF7A1989000
unkown
page write copy
23DD188D000
heap
page read and write
22358A0B000
heap
page read and write
2ABA1871000
heap
page read and write
1CA60EBA000
heap
page read and write
1AAACD0D000
heap
page read and write
18D01650000
heap
page read and write
1ACDF760000
heap
page read and write
1CA6126D000
heap
page read and write
1CA60E7E000
heap
page read and write
C7731FE000
stack
page read and write
1CA60BBE000
heap
page read and write
21145777000
heap
page read and write
23DD1F89000
heap
page read and write
1CA60AF3000
heap
page read and write
1CA60BBE000
heap
page read and write
792687C000
stack
page read and write
7FFB1E542000
unkown
page readonly
1CA60EFF000
heap
page read and write
223589CE000
heap
page read and write
1CA60C12000
heap
page read and write
18564537000
heap
page read and write
1CA60CF9000
heap
page read and write
1CB021DF000
heap
page read and write
1CA60C60000
heap
page read and write
223589F8000
heap
page read and write
261BE6C5000
heap
page read and write
1CA60D3F000
heap
page read and write
1CA61206000
heap
page read and write
1CA6106D000
heap
page read and write
1AAB0336000
heap
page read and write
1CA60026000
heap
page read and write
1CA60CBC000
heap
page read and write
1CA60DFB000
heap
page read and write
22358353000
heap
page read and write
1CA600C8000
heap
page read and write
1CA60022000
heap
page read and write
7FF7A197B000
unkown
page readonly
1CA60C50000
heap
page read and write
1CA6107E000
heap
page read and write
1CA60D40000
heap
page read and write
23DD1F78000
heap
page read and write
1CA60DBB000
heap
page read and write
1CA60EF4000
heap
page read and write
24C886B0000
trusted library allocation
page read and write
1CA6106D000
heap
page read and write
1CA60116000
heap
page read and write
1CA601FC000
heap
page read and write
23DD1950000
trusted library allocation
page read and write
1CA60CFA000
heap
page read and write
22358349000
heap
page read and write
1CA61260000
heap
page read and write
1CA60D52000
heap
page read and write
1CA61266000
heap
page read and write
1CB01C02000
heap
page read and write
1CA60C91000
heap
page read and write
1CA611F5000
heap
page read and write
1CA60AEE000
heap
page read and write
223584C5000
heap
page read and write
18D01E19000
heap
page read and write
1CA60F87000
heap
page read and write
1AAAFB36000
heap
page read and write
1CA60BB6000
heap
page read and write
1CA60C71000
heap
page read and write
1CA60FE3000
heap
page read and write
1CA6124D000
heap
page read and write
1CA610DD000
heap
page read and write
1CA60CA7000
heap
page read and write
18D03693000
heap
page read and write
1CA60102000
heap
page read and write
1CA60E4A000
heap
page read and write
18D01E00000
heap
page read and write
7FFAAB51A000
trusted library allocation
page read and write
7FFAAB500000
trusted library allocation
page read and write
1CA60C45000
heap
page read and write
1CA600C8000
heap
page read and write
18D0369D000
heap
page read and write
24C88779000
heap
page read and write
1CA60CBF000
heap
page read and write
1CA60BAF000
heap
page read and write
24C887BE000
heap
page read and write
1CA60B13000
heap
page read and write
1CA60FCF000
heap
page read and write
1CA60113000
heap
page read and write
1CA60FBD000
heap
page read and write
23DD1837000
heap
page read and write
1CA60F5C000
heap
page read and write
1CA60CC2000
heap
page read and write
24C88D38000
heap
page read and write
1CA60D87000
heap
page read and write
1CA600D1000
heap
page read and write
24C88783000
heap
page read and write
1CA60CC1000
heap
page read and write
1CA6013C000
heap
page read and write
1CA5FF78000
heap
page read and write
1CA6126F000
heap
page read and write
1CA60C86000
heap
page read and write
1CA60044000
heap
page read and write
A3C556F000
stack
page read and write
1CA60C3C000
heap
page read and write
1CA61254000
heap
page read and write
1CA60F75000
heap
page read and write
1CA600F3000
heap
page read and write
1CA60CC0000
heap
page read and write
1CA60D7C000
heap
page read and write
1CA60B23000
heap
page read and write
24C8877D000
heap
page read and write
1CA60D97000
heap
page read and write
2861AD60000
heap
page read and write
1CA611C5000
heap
page read and write
1CA60BA5000
heap
page read and write
1CB01E8B000
heap
page read and write
1CA60E83000
heap
page read and write
1CA61190000
heap
page read and write
1CA60AE0000
heap
page read and write
1CA60DA5000
heap
page read and write
1CA600F7000
heap
page read and write
223589CA000
heap
page read and write
2112B653000
heap
page read and write
1CA60CE2000
heap
page read and write
1CA60CBF000
heap
page read and write
1CA60B23000
heap
page read and write
1CA60FA8000
heap
page read and write
24C88D38000
heap
page read and write
1CA60B12000
heap
page read and write
1CA60ED1000
heap
page read and write
1CA600C6000
heap
page read and write
1CA61251000
heap
page read and write
1CA60CF7000
heap
page read and write
1CB01E54000
heap
page read and write
1CA61038000
heap
page read and write
1CA600D1000
heap
page read and write
1CA610A0000
heap
page read and write
1CA60B01000
heap
page read and write
1CA6013B000
heap
page read and write
223582F2000
heap
page read and write
1CA60D9F000
heap
page read and write
1CA60F6D000
heap
page read and write
1CA61005000
heap
page read and write
1CA60D3D000
heap
page read and write
1CA61023000
heap
page read and write
1ACDF885000
heap
page read and write
1CA600FF000
heap
page read and write
59E10FF000
stack
page read and write
1CA60DB4000
heap
page read and write
1CA60116000
heap
page read and write
2112ED27000
trusted library allocation
page read and write
1CA61026000
heap
page read and write
1CA61216000
heap
page read and write
1CA60AF6000
heap
page read and write
1CA60AE1000
heap
page read and write
18D01818000
heap
page read and write
1CA60C8C000
heap
page read and write
792697E000
stack
page read and write
1CA60EB9000
heap
page read and write
1CA61142000
heap
page read and write
1CA60B9C000
heap
page read and write
1CA60F51000
heap
page read and write
1CA610CB000
heap
page read and write
223589FA000
heap
page read and write
1CA600C6000
heap
page read and write
7FFAAB690000
trusted library allocation
page read and write
1CA61042000
heap
page read and write
1CA60CF0000
heap
page read and write
1CA60CA5000
heap
page read and write
1CA60C74000
heap
page read and write
D710CFF000
stack
page read and write
1CA60DE5000
heap
page read and write
2112B5BC000
heap
page read and write
1CA60130000
heap
page read and write
23DD1AD5000
heap
page read and write
1CA60DA2000
heap
page read and write
2112B5B2000
heap
page read and write
1CA60AF3000
heap
page read and write
1CA61267000
heap
page read and write
1CA61190000
heap
page read and write
1CA60CC3000
heap
page read and write
1CA60CEA000
heap
page read and write
18D01880000
heap
page read and write
1CA6118E000
heap
page read and write
1CA61144000
heap
page read and write
23DD1F7D000
heap
page read and write
18D01770000
trusted library allocation
page read and write
185647C0000
heap
page read and write
848867F000
stack
page read and write
1CA60DEE000
heap
page read and write
1CA60BBE000
heap
page read and write
1CA60D22000
heap
page read and write
1CA60C88000
heap
page read and write
1CA60F45000
heap
page read and write
1CA600E4000
heap
page read and write
1CA60C38000
heap
page read and write
1CA60AE6000
heap
page read and write
24C88D20000
heap
page read and write
1CA60CB1000
heap
page read and write
28BB39C9000
heap
page read and write
23DD18A7000
heap
page read and write
24C88D22000
heap
page read and write
1CA60E00000
heap
page read and write
1CA60DE2000
heap
page read and write
1CA60AFB000
heap
page read and write
1CA60AE6000
heap
page read and write
1CA60C3C000
heap
page read and write
1CA611D3000
heap
page read and write
7FFB1E545000
unkown
page readonly
1CA61046000
heap
page read and write
1CA600D1000
heap
page read and write
24C88D26000
heap
page read and write
1CB01C06000
heap
page read and write
24C88D10000
heap
page read and write
24C8A5C4000
heap
page read and write
1CA60044000
heap
page read and write
23DD186C000
heap
page read and write
1CA60C9C000
heap
page read and write
1CA60B15000
heap
page read and write
1CA61263000
heap
page read and write
D710BFF000
unkown
page read and write
1CA611E6000
heap
page read and write
1CA60F24000
heap
page read and write
7FF7A1989000
unkown
page read and write
1CA6111A000
heap
page read and write
1CA60FF4000
heap
page read and write
18D01DF0000
heap
page read and write
1CA611DB000
heap
page read and write
24C88763000
heap
page read and write
223589EB000
heap
page read and write
1CA60D09000
heap
page read and write
1CA60FCA000
heap
page read and write
1CA60E2A000
heap
page read and write
1CA6110B000
heap
page read and write
23DD3802000
heap
page read and write
1CA60BBE000
heap
page read and write
1CA60C31000
heap
page read and write
1CB03A7E000
heap
page read and write
1CA61212000
heap
page read and write
1CA60F06000
heap
page read and write
1CA61062000
heap
page read and write
1CA61005000
heap
page read and write
1CA600E4000
heap
page read and write
1CA60FFE000
heap
page read and write
1CA60D0A000
heap
page read and write
1856453A000
heap
page read and write
1CA60C46000
heap
page read and write
1CA60C59000
heap
page read and write
1CA60A74000
heap
page read and write
24C88D00000
heap
page read and write
2235833C000
heap
page read and write
2235834C000
heap
page read and write
1CA60137000
heap
page read and write
1CA610D1000
heap
page read and write
1CA60D36000
heap
page read and write
18D01E00000
heap
page read and write
1CB02204000
heap
page read and write
1CA60D9F000
heap
page read and write
2112D4EA000
trusted library allocation
page read and write
1CA6010F000
heap
page read and write
24C88D19000
heap
page read and write
1CA60F6D000
heap
page read and write
1CB021F9000
heap
page read and write
22358333000
heap
page read and write
7FFB1E536000
unkown
page readonly
1CA60F0B000
heap
page read and write
1CA61241000
heap
page read and write
22358368000
heap
page read and write
1CA6126B000
heap
page read and write
1CA60E10000
heap
page read and write
1CA60BDE000
heap
page read and write
7FF7A198D000
unkown
page read and write
1CA60CFB000
heap
page read and write
1CA60044000
heap
page read and write
1CA60CC0000
heap
page read and write
1CA60D65000
heap
page read and write
1CA600F3000
heap
page read and write
285ED7C000
stack
page read and write
C249FAE000
stack
page read and write
1CA60E9B000
heap
page read and write
1CA60BE7000
heap
page read and write
1CA60EE1000
heap
page read and write
22358346000
heap
page read and write
1E113C70000
heap
page read and write
1CA600FF000
heap
page read and write
1CA60CC2000
heap
page read and write
223582EE000
heap
page read and write
1CA60116000
heap
page read and write
1CA60102000
heap
page read and write
1CA60BC1000
heap
page read and write
1CA60116000
heap
page read and write
23DD1848000
heap
page read and write
1CA61241000
heap
page read and write
22358A0B000
heap
page read and write
7FFB1E520000
unkown
page readonly
1CA60CB0000
heap
page read and write
285F036000
stack
page read and write
1CA60D06000
heap
page read and write
1CA60D48000
heap
page read and write
1CA61079000
heap
page read and write
1CA6013A000
heap
page read and write
1CA611E6000
heap
page read and write
18D01E25000
heap
page read and write
1CA60130000
heap
page read and write
1CA60CC1000
heap
page read and write
1CA61114000
heap
page read and write
28BB3970000
heap
page read and write
18D01E23000
heap
page read and write
1CA61124000
heap
page read and write
2ABA1861000
heap
page read and write
1CA60BD8000
heap
page read and write
1CA60E6E000
heap
page read and write
21145784000
heap
page read and write
1CA60C97000
heap
page read and write
1CA60B23000
heap
page read and write
1CA611EF000
heap
page read and write
1CA60E03000
heap
page read and write
1CA600CA000
heap
page read and write
1CA60E94000
heap
page read and write
1CA60AE3000
heap
page read and write
1CA60CB1000
heap
page read and write
1CA60BC5000
heap
page read and write
1CA600D1000
heap
page read and write
2235A360000
heap
page read and write
1CA60031000
heap
page read and write
223589E2000
heap
page read and write
1CA60044000
heap
page read and write
1CA61102000
heap
page read and write
1CA600F3000
heap
page read and write
1CA60F00000
heap
page read and write
1CA60D69000
heap
page read and write
1CA60FA3000
heap
page read and write
1CA60C67000
heap
page read and write
1CA60044000
heap
page read and write
1CA60F6D000
heap
page read and write
A3C54EC000
stack
page read and write
1CA60C95000
heap
page read and write
1CA601FC000
heap
page read and write
223584CA000
heap
page read and write
1CA60BD1000
heap
page read and write
18D01CA0000
heap
page read and write
1CA60FCD000
heap
page read and write
21145529000
heap
page read and write
1CA600DC000
heap
page read and write
18D01DFD000
heap
page read and write
1CA60C97000
heap
page read and write
23DD1871000
heap
page read and write
21145732000
heap
page read and write
1CA60BD5000
heap
page read and write
1CA60B16000
heap
page read and write
1CA611F5000
heap
page read and write
1CA60C6A000
heap
page read and write
1CA60B11000
heap
page read and write
1CA60ED2000
heap
page read and write
1CA601FC000
heap
page read and write
1CA60DFB000
heap
page read and write
1CA60C4A000
heap
page read and write
7FF7A1992000
unkown
page read and write
2112F072000
trusted library allocation
page read and write
1CA60D0A000
heap
page read and write
1CA60BED000
heap
page read and write
1CA60CFA000
heap
page read and write
18D018F9000
heap
page read and write
18D0189B000
heap
page read and write
1CA600F3000
heap
page read and write
1CA61270000
heap
page read and write
1CA601FC000
heap
page read and write
1718047B000
heap
page read and write
24C8A5C4000
heap
page read and write
1CA60D25000
heap
page read and write
24C88D38000
heap
page read and write
1ACDF9B0000
heap
page read and write
1CA60F9B000
heap
page read and write
1CB03B80000
heap
page read and write
E39116E000
stack
page read and write
2112ECA1000
trusted library allocation
page read and write
22D597F7000
heap
page read and write
23DD1F7D000
heap
page read and write
1CA60D01000
heap
page read and write
1CB01B60000
trusted library allocation
page read and write
1CA601FC000
heap
page read and write
1CA5E24C000
heap
page read and write
1CB01BF4000
heap
page read and write
28BB3B80000
heap
page read and write
23DD183F000
heap
page read and write
1CA60CBF000
heap
page read and write
185647C5000
heap
page read and write
1CA6124C000
heap
page read and write
7FF66508E000
unkown
page readonly
7FFAAB640000
trusted library allocation
page read and write
1CA60D85000
heap
page read and write
1CA60C3A000
heap
page read and write
1CA6137B000
heap
page read and write
1CA60D68000
heap
page read and write
FD951FF000
stack
page read and write
1CA61187000
heap
page read and write
1CA60B08000
heap
page read and write
1CA60DFB000
heap
page read and write
1CA60FC0000
heap
page read and write
1CA60031000
heap
page read and write
7FFAAB600000
trusted library allocation
page read and write
1CA611BB000
heap
page read and write
24C88720000
heap
page read and write
1CB01C08000
heap
page read and write
1CA600C8000
heap
page read and write
1E113D5A000
heap
page read and write
1CA60F5C000
heap
page read and write
1CA611EF000
heap
page read and write
22358A0A000
heap
page read and write
1CA60DE3000
heap
page read and write
1CA60D0A000
heap
page read and write
1CA6127D000
heap
page read and write
1CA60CF5000
heap
page read and write
223589C0000
heap
page read and write
1CA600C4000
heap
page read and write
1CA60DB3000
heap
page read and write
1CA60D98000
heap
page read and write
1CA60029000
heap
page read and write
1CA60D9F000
heap
page read and write
2235A372000
heap
page read and write
1CA60ABB000
heap
page read and write
1CA60E59000
heap
page read and write
1CA60C48000
heap
page read and write
1CB01BFF000
heap
page read and write
1AAAF63E000
heap
page read and write
1CA6128E000
heap
page read and write
1CA600C8000
heap
page read and write
211454AD000
heap
page read and write
1CA60DC0000
heap
page read and write
1CA6010F000
heap
page read and write
1CA60B23000
heap
page read and write
1CA60F0A000
heap
page read and write
1CA6010D000
heap
page read and write
21145513000
heap
page read and write
1CB01E57000
heap
page read and write
1CA60B23000
heap
page read and write
1CA610AE000
heap
page read and write
1CA6002E000
heap
page read and write
2235A37E000
heap
page read and write
1CA60102000
heap
page read and write
1CA60D2A000
heap
page read and write
22358333000
heap
page read and write
1CA60C86000
heap
page read and write
1CA60D95000
heap
page read and write
1CA60E1A000
heap
page read and write
1CA60CA8000
heap
page read and write
1CA5E24C000
heap
page read and write
1CA60E33000
heap
page read and write
23DD1F99000
heap
page read and write
18D017DD000
heap
page read and write
23DD189E000
heap
page read and write
There are 2785 hidden memdumps, click here to show them.