IOC Report
SecuriteInfo.com.Trojan.Siggen22.5496.3468.3170.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Siggen22.5496.3468.3170.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Remote Support.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\Remote SupportWinLauncher.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\SimpleService.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\cadasuser.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\elev_mac
Mach-O universal binary with 3 architectures: [i386:\012- Mach-O i386 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_HEAP_EXECUTION>] [x86_64:Mach-O 64-bit x86_64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL>] [arm64:Mach-O 64-bit arm64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|PIE>]
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\elev_win.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\jwutils_win32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\jwutils_win64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\session_win.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\setsid
Mach-O universal binary with 3 architectures: [i386:\012- Mach-O i386 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_HEAP_EXECUTION>] [x86_64:Mach-O 64-bit x86_64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL>] [arm64:Mach-O 64-bit arm64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|PIE>]
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\shcad.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\shlinuxutil
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.2.0, stripped
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\shlinuxutil32arm
ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-armhf.so.3, for GNU/Linux 2.6.26, BuildID[sha1]=507685fb8feca3723270b8ae80547d48f9b62d70, stripped
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\shlinuxutil64
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.0, stripped
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\shlinuxutil64arm
ELF 64-bit LSB pie executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=431f525625c5beb4fbfb109a08b2d73fdc6852ec, stripped
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\simplehelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\simplehelper64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\translations\en.txt
ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\utils_wnative_dxgi_intel-32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\utils_wnative_dxgi_intel-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\utils_wnative_intel-32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\utils_wnative_intel-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\utils_wnative_shpty_intel-32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\utils_wnative_shpty_intel-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\utils_wnative_winpty_intel-32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\utils_wnative_winpty_intel-64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\winpty-agent.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\winpty-agent64.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\JAWTAccessBridge-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\JavaAccessBridge-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\WindowsAccessBridge-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\awt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\dt_shmem.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\dt_socket.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\fontmanager.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\freetype.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\hprof.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\instrument.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\j2pcsc.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\j2pkcs11.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\jaas_nt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\java-rmi.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\java.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\java.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\javaw.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\jawt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\jdwp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\jjs.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\jli.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\jpeg.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\jsdt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\jsound.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\jsoundds.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\lcms.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\management.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\mlib_image.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\net.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\nio.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\npt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\pack200.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\server\jvm.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\splashscreen.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\sunec.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\sunmscapi.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\verify.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\w2k_lsa_auth.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\windowslauncher.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\zip.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\SimpleHelp\ElevateSH\MMoveLauncher5018212369185496700.service
ASCII text, with very long lines (650), with CRLF line terminators
dropped
C:\ProgramData\SimpleHelp\ElevateSH\elev_win.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\JWrapper-Windows64JRE-version[1].txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\JWrapper-Windows64JRE-version[2].txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\JWrapper-Windows64JRE-version[1].txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\6176
data
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\7188
data
dropped
C:\Users\user\AppData\Local\Temp\imageio4525615545212259805.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio4780253981931788370.tmp
PNG image data, 10 x 18, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio5969198081645735571.tmp
PNG image data, 4 x 18, 8-bit grayscale, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio6464473047518619385.tmp
PNG image data, 378 x 251, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio6511439493065227657.tmp
PNG image data, 4 x 18, 8-bit grayscale, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio6517616620235852759.tmp
PNG image data, 4 x 18, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio6573506601638423229.tmp
PNG image data, 756 x 502, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\DetectedProxies
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\ProxyCredentials
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\basicinfo
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\branding\helpUalphetacsUcomG80\applet_splash.png
PNG image data, 378 x 251, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\branding\helpUalphetacsUcomG80\applet_splash@2x.png
PNG image data, 756 x 502, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\branding\helpUalphetacsUcomG80\branding.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\ChosenLanguage
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\JRE-LastSuccessfulOptions-JWrapper-Windows64JRE-00084000053-complete
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\JreNameOverride
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\JreNameOverride.afos_complete (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\JreNameOverride.afos_interim
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\Remote_SupportICO.ico
MS Windows icon resource - 5 icons, 16x16, 32 bits/pixel, 24x24, 32 bits/pixel
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\JWrapper-Windows64JRE-version.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\unrestricted\JWLaunchProperties-4187062744-23
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\unrestricted\JWrapper-Remote Support-splash.png
PNG image data, 300 x 199, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\unrestricted\jwLastRun
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\JWrapperUseJRE
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\unrestricted\JWLaunchProperties-1713584048640-1
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\unrestricted\jwLastRun
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Session Elevation Helper
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\unrestricted\jwLastRun
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAppNote-JWrapperJreCompatibilityApp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAppSpec-AutoTest
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAppSpec-JWrapperJreCompatibilityApp
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAppSpec-JWrapperMatchedVersionServerUnavailable
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAppSpec-JWrapper_Service_Management_App
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAppSpec-Remote_Support
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAuxiliaryArchive-Remote Support_linarmutils32
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAuxiliaryArchive-Remote Support_linarmutils64
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAuxiliaryArchive-Remote Support_linutils32
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAuxiliaryArchive-Remote Support_linutils64
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAuxiliaryArchive-Remote Support_macutils32
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAuxiliaryArchive-Remote Support_macutils64
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAuxiliaryArchive-Remote Support_macutilsarm
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAuxiliaryArchive-Remote Support_os_jwwin64
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAuxiliaryArchive-Remote Support_winutils32
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWAuxiliaryArchive-Remote Support_winutils64
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWrapper-JWrapper-version.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWrapper-Remote Support-ICNS.icns
Mac OS X icon, 118432 bytes, "is32" type
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWrapper-Remote Support-UninstallerICO.icopng
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWrapper-Remote Support-splash.png
PNG image data, 352 x 72, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWrapper-Remote Support-version.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\JWrapperLaunch
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\customer-jar-with-dependencies.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\customer-jar-with-dependencies.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\fontconfig.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\jwAuthorPublicKey
ASCII text, with very long lines (1033), with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\jwBuildVersion
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\jwrapper_license
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\jwrapperlib\jwstandalone.jar
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\jwrapperlib\jwstandalonelaunch.jar
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libjwutils_linux32.so
ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, with debug_info, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libjwutils_linux32arm.so
ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, BuildID[sha1]=0d3184baadd25544b9ede9ac16431accd8ba85b7, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libjwutils_linux64.so
ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, with debug_info, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libjwutils_linux64arm.so
ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=4b97def7328c5ced5eaff796c3e6ba3ff532c45b, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libjwutils_macos.jnilib
Mach-O universal binary with 3 architectures: [x86_64:Mach-O 64-bit x86_64 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK|NO_REEXPORTED_DYLIBS>] [i386:Mach-O i386 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK|NO_REEXPORTED_DYLIBS>] [arm64:Mach-O 64-bit arm64 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK|NO_REEXPORTED_DYLIBS>]
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_lnative_base_arm-32.so
ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, BuildID[sha1]=24c49cfad556ec10a11ff1f76fa38837f11eedd4, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_lnative_base_arm-64.so
ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=b08c12adf7a6eecd96eea4500533b4d34bb63e7e, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_lnative_base_intel-32.so
ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=ea09cded1d8d1d6025689fce403d99330ccb7f20, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_lnative_base_intel-64.so
ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=7ce88aa9e4ad542ef7acb6308b4b39138a05905e, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_lnative_grab_arm-32.so
ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, BuildID[sha1]=7f15c3163e8d4f99f231f4376e7bdd2506d6dab4, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_lnative_grab_arm-64.so
ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=59062dd60176c81290899b73d214b2e79e23fa1d, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_lnative_grab_intel-32.so
ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=983af6c747bb1f6190a4784faa9972be761323a2, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_lnative_grab_intel-64.so
ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=d939c78b1a97fb52b3bdf9f1354ca0d209a25baf, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_lnative_wlgrab_arm-32.so
ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, BuildID[sha1]=89d29057f4380122032b0f58cd14fcbabc138d65, stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_lnative_wlgrab_arm-64.so
ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=1b22c3fd3aab5963a88d50dbe64e8ed98ac20398, stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_lnative_wlgrab_intel-32.so
ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=053f1bb5e7fd9862400c09b65450800fef1af96a, stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_lnative_wlgrab_intel-64.so
ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=7289b06ab84351098a1a9d22698830a3601537d1, stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_mnative_arm-64.jnilib
Mach-O 64-bit arm64 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_REEXPORTED_DYLIBS>
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_mnative_intel-32.jnilib
Mach-O i386 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_REEXPORTED_DYLIBS>
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_mnative_intel-64.jnilib
Mach-O 64-bit x86_64 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_REEXPORTED_DYLIBS>
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_mnative_lion_intel-32.jnilib
Mach-O i386 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_REEXPORTED_DYLIBS>
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\libutils_mnative_lion_intel-64.jnilib
Mach-O 64-bit x86_64 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_REEXPORTED_DYLIBS>
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\nativesplash.png
PNG image data, 300 x 199, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\translations\da.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\translations\de.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\translations\es.txt
Unicode text, UTF-8 text, with very long lines (315)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\translations\fr.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\translations\it.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\translations\nl.txt
Unicode text, UTF-8 text, with very long lines (305)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\translations\pt.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\translations\sv.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\ASSEMBLY_EXCEPTION
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\CLASSPATH_EXCEPTION_NOTE
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\DISCLAIMER
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\THIRD_PARTY_README
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\Welcome.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\msvcr100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\server\Xusage.txt
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\accessibility.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\amd64\jvm.cfg
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\calendars.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\charsets.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\charsets.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\classlist
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\cmm\CIEXYZ.pf
Microsoft color profile 2.3, type lcms, XYZ/XYZ-abst device by lcms, 784 bytes, 28-12-2006 18:07:22, no copyright tag "lcms XYZ identity"
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\cmm\GRAY.pf
Microsoft color profile 2.3, type lcms, GRAY/XYZ-mntr device by lcms, 556 bytes, 28-12-2006 18:07:22, no copyright tag "lcms gray virtual profile"
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\cmm\LINEAR_RGB.pf
ColorSync color profile 2.3, type lcms, RGB/XYZ-mntr device by lcms, 488 bytes, 28-3-2008 14:24:37, transparent, relative colorimetric "linear sRGB"
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\cmm\PYCC.pf
ColorSync color profile 4.0, type lcms, 3CLR/XYZ-spac device by lcms, 234080 bytes, 10-4-2008 10:24:22, transparent, relative colorimetric, 0xf0e75c55d21e4d8c MD5 'PYCC from PCD 045'
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\cmm\sRGB.pf
Microsoft color profile 2.3, type lcms, RGB/XYZ-mntr device by lcms, 6876 bytes, 28-12-2006 18:07:22, no copyright tag "sRGB built-in"
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\content-types.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\crs-agent.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\crs-agent.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\currency.data
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\access-bridge-64.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\access-bridge-64.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\cldrdata.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\cldrdata.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\jaccess.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\jaccess.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\legacy8ujsse.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\legacy8ujsse.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\meta-index
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\openjsse.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\openjsse.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\sunec.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\sunjce_provider.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\sunmscapi.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\sunmscapi.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\sunpkcs11.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\sunpkcs11.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\flavormap.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\fontconfig.bfc
raw G3 (Group 3) FAX
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\fontconfig.properties.src
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\hijrah-config-umalqura.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\images\cursors\cursors.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\images\cursors\invalid32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\images\cursors\win32_CopyDrop32x32.gif
GIF image data, version 89a, 31 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\images\cursors\win32_CopyNoDrop32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\images\cursors\win32_LinkDrop32x32.gif
GIF image data, version 89a, 31 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\images\cursors\win32_LinkNoDrop32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\images\cursors\win32_MoveDrop32x32.gif
GIF image data, version 89a, 31 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\images\cursors\win32_MoveNoDrop32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\jce.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\jsse.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\jsse.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\jvm.hprof.txt
Algol 68 source, ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\logging.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\management-agent.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\management\jmxremote.access
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\management\jmxremote.password.template
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\management\management.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\management\snmp.acl.template
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\meta-index
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\net.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\psfont.properties.ja
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\psfontj2d.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\resources.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\rt.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\rt.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\security\blacklisted.certs
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\security\cacerts
Java KeyStore
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\security\java.policy
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\security\java.security
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\security\legacy8ujsse.security
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\security\openjsse.security
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\security\policy\limited\US_export_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\security\policy\limited\local_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\security\policy\unlimited\US_export_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\security\policy\unlimited\local_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\sound.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\tzdb.dat
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\tzmappings
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\readme.txt
ASCII text, with very long lines (347)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\release
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\logs\GenericUpdater-2024-04-20-05-34-06-974-pid0.log
ASCII text, with very long lines (318), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\logs\Remote Support-Remote Support-2024-04-20-05-33-09-717-pid7188.log
ASCII text, with very long lines (1686), with CRLF, LF line terminators
modified
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\logs\Wrapper-2024-04-20-05-32-01-330.log
ASCII text, with very long lines (384), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Windows\Temp\hsperfdata_user-PC$\1144
data
dropped
C:\Windows\Temp\hsperfdata_user-PC$\404
data
dropped
There are 248 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen22.5496.3468.3170.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen22.5496.3468.3170.exe"
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Remote Support.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Remote Support.exe" -cp "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" -Xmx512m -Xms5m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2,TLSv1.3 -Dsun.awt.fontconfig=fontconfig.properties jwrapper.JWrapper "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\unrestricted\JWLaunchProperties-1713584048640-1"
malicious
C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe
"C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe" "-install" "C:\ProgramData\SimpleHelp\ElevateSH\MMoveLauncher5018212369185496700.service"
malicious
C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe
"C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe"
malicious
C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe
"C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe" -uninstallbyname ShTemporaryService53942608
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\crs-agent.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\crs-agent.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\charsets.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\charsets.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\jsse.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\jsse.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\jaccess.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\jaccess.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\sunpkcs11.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\sunpkcs11.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\openjsse.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\openjsse.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\legacy8ujsse.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\legacy8ujsse.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\cldrdata.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\cldrdata.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\access-bridge-64.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\access-bridge-64.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\sunmscapi.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\ext\sunmscapi.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\rt.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\lib\rt.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\windowslauncher.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\windowslauncher.exe" "-Xshare:dump"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\customer-jar-with-dependencies.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583921-5-app\customer-jar-with-dependencies.jar"
C:\Windows\System32\icacls.exe
icacls "C:\ProgramData\SimpleHelp" /t /c /grant *S-1-1-0:(OI)(CI)F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\icacls.exe
icacls "C:\ProgramData\SimpleHelp\ElevateSH" /t /c /grant *S-1-5-32-545:(OI)(CI)F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\icacls.exe
icacls "C:\ProgramData\SimpleHelp\ElevateSH\*.*" /t /c /grant *S-1-1-0:(OI)(CI)F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\ProgramData\SimpleHelp\ElevateSH\elev_win.exe
C:\ProgramData\SimpleHelp\ElevateSH\elev_win.exe C:\ProgramData\SimpleHelp\ElevateSH\elev_win.exe C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe -install C:\ProgramData\SimpleHelp\ElevateSH\MMoveLauncher5018212369185496700.service
C:\ProgramData\SimpleHelp\ElevateSH\elev_win.exe
"C:\ProgramData\SimpleHelp\ElevateSH\elev_win.exe" "C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe" "-install" "C:\ProgramData\SimpleHelp\ElevateSH\MMoveLauncher5018212369185496700.service"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\session_win.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\session_win.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\windowslauncher.exe" "-cp" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" "-Xmx128m" "-Xms5m" "-Dsun.java2d.dpiaware=true" "-Djava.library.path=C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete" "com.aem.sdesktop.util.MouseMover" "127.0.0.1" "49745" "127.0.0.1" "49746" "elevated"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713583982-6-app\bin\windowslauncher.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\windowslauncher.exe" "-cp" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" "-Xmx128m" "-Xms5m" "-Dsun.java2d.dpiaware=true" "-Djava.library.path=C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete" "com.aem.sdesktop.util.MouseMover" "127.0.0.1" "49745" "127.0.0.1" "49746" "elevated"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Session Elevation Helper
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Session Elevation Helper" -cp "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" -Xmx128m -Xms5m -Dsun.java2d.dpiaware=true "-Djava.library.path=C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete" com.aem.sdesktop.util.MouseMover 127.0.0.1 49749 127.0.0.1 49750 elevated_backup
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://help.alphetacs.com/customer/JWrapper-Remote%20Support-version.txt
139.64.137.101
malicious
http://help.alphetacs.com/customer/JWrapper-Windows64JRE-version.txt?time=4186938694
139.64.137.101
malicious
http://help.alphetacs.com/customer/JWrapper-JWrapper-version.txt
139.64.137.101
malicious
http://help.alphetacs.com/branding/applet_splash.png?a=3
139.64.137.101
malicious
http://help.alphetacs.com/simplehelpdetails.txt
139.64.137.101
malicious
http://help.alphetacs.com/branding/brandingfiles?a=3
139.64.137.101
malicious
http://help.alphetacs.com/simplehelpdisclaimer.txt?language=en
139.64.137.101
malicious
http://help.alphetacs.com/translations_user/en.txt
139.64.137.101
malicious
http://help.alphetacs.com/server_side_parameters
139.64.137.101
malicious
http://help.alphetacs.com/branding/branding.properties?a=3
139.64.137.101
malicious
http://maven.apa.org/POM/4.0.0
unknown
http://www.azul.com/license/zulu_third_party_licenses.html
unknown
http://www.freebxml.org/
unknown
http://www.oracle.com/goto/opensourcecode/request
unknown
http://maven.apache.org/POM/4.0.0
unknown
http://ocsp.sectigo.com0
unknown
http://www.azul.com
unknown
http://www.freetype.org/license.html
unknown
http://upx.sourceforge.net/upx-license.html.
unknown
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/file/tip/src/share/native/sun/security/ec/impl
unknown
http://maven.apa
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
http://www.freebxml.org/).
unknown
http://0.0.254.254
unknown
http://mozilla.org/MPL/2.0/.
unknown
http://www.apache.org/).
unknown
http://www.unicode.org/Public/
unknown
https://sectigo.com/CPS0D
unknown
http://relaxngcc.sf.net/).
unknown
http://www.nexus.hu/upx
unknown
http://tartarus.org/~martin/PorterStemmer
unknown
https://github.com/giltene
unknown
http://openjdk.java.net/legal/exception-modules-2007-05-08.html
unknown
https://maven.apache.org/xsd/maven-4.0.0.xsd
unknown
https://github.com/dkozorez
unknown
http://www.oasis-open.org/policies-guidelines/ipr
unknown
http://zulu.org/forum
unknown
http://wildsau.idv.uni-linz.ac.at/mfx/upx.html
unknown
http://0.0.254.254%lu
unknown
http://docs.azul.com/zulu/zuludocs/
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.unicode.org/Public/.
unknown
https://sectigo.com/CPS0
unknown
http://www.apache.org/licenses/
unknown
https://github.com/alexeybakhtin
unknown
http://openjsse.github.io/legacy8ujsse/
unknown
https://docs.oracle.com/en/java/javase/13/docs/api/
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
http://www.unicode.org/reports/
unknown
https://oss.sonatype.org/
unknown
http://www.xfree86.org/)
unknown
https://docs.oracle.com/javase/8/docs/api/
unknown
http://www.ecma-international.org/memento/codeofconduct.htm
unknown
https://openjdk.java.net/legal/gplv2
unknown
http://www.unicode.org/cldr/data/.
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://maven.apache.org/xsd/maven-4.0.0.xsd
unknown
https://opensource.org/licenses/BSD-2-Clause
unknown
http://openjsse.github.io/openjsse/
unknown
https://github.com/papalukas
unknown
http://www.gnu.org/licenses/gpl-2.0.txt
unknown
https://www.thawte.com/cps0/
unknown
https://docs.oracle.com/en/java/javase/11/docs/api/
unknown
http://www.ecma-international.org
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://www.thawte.com/repository0W
unknown
https://oss.sonatype.org/content/repositories/snapshots
unknown
http://maven.apache.org/POM/4.0
unknown
https://secure.comodo.com/CPS0L
unknown
https://github.com/openjsse/openjsse/issues
unknown
http://docs.azul.com/zulu/zulurelnotes/
unknown
http://www.unicode.org/copyright.html.
unknown
http://upx.tsx.org
unknown
https://github.com/legacy8ujsse/legacy8ujsse/issues
unknown
http://www.gnu.org/copyleft/gpl.html
unknown
There are 65 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
help.alphetacs.com
139.64.137.101
malicious

IPs

IP
Domain
Country
Malicious
139.64.137.101
help.alphetacs.com
Reserved
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\ShTemporaryService53942608
NULL
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ShTemporaryService53942608\Parameters
workingdir
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ShTemporaryService53942608\Parameters
cmdline
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ShTemporaryService53942608\Parameters
auto_restart
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ShTemporaryService53942608\Parameters
run_once
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ShTemporaryService53942608\Parameters
do_cad

Memdumps

Base Address
Regiontype
Protect
Malicious
C3B000
heap
page read and write
AC5000
heap
page read and write
C32000
heap
page read and write
F3E000
heap
page read and write
D07000
heap
page read and write
DC4000
heap
page read and write
F34000
heap
page read and write
E0F000
heap
page read and write
E0F000
heap
page read and write
F46000
heap
page read and write
11BC000
heap
page read and write
17C3000
heap
page read and write
7FF6D834D000
unkown
page read and write
DC4000
heap
page read and write
BC8000
heap
page read and write
CF7000
heap
page read and write
D0C000
heap
page read and write
2A3F000
heap
page read and write
DFC000
heap
page read and write
DFC000
heap
page read and write
DD8000
heap
page read and write
2686000
trusted library allocation
page read and write
1598000
heap
page read and write
16CF000
heap
page read and write
AE3000
heap
page read and write
AAE000
heap
page read and write
CE8000
heap
page read and write
16EF000
heap
page read and write
17D4000
heap
page read and write
17B0000
heap
page read and write
E0F000
heap
page read and write
C24000
heap
page read and write
2C81000
heap
page read and write
E0F000
heap
page read and write
2A37000
heap
page read and write
DA8000
heap
page read and write
C0D000
heap
page read and write
DC3000
heap
page read and write
17E1000
heap
page read and write
B58000
heap
page read and write
4D10000
heap
page read and write
BB4000
heap
page read and write
DFC000
heap
page read and write
11D3000
heap
page read and write
C00000
heap
page read and write
17C6000
heap
page read and write
CFB000
heap
page read and write
DB0000
heap
page read and write
F3E000
heap
page read and write
BC8000
heap
page read and write
AD1000
heap
page read and write
17DC000
heap
page read and write
17E1000
heap
page read and write
17D0000
heap
page read and write
29FC000
heap
page read and write
2A30000
heap
page read and write
DA8000
heap
page read and write
AC5000
heap
page read and write
2A19000
heap
page read and write
D51000
heap
page read and write
BFC000
heap
page read and write
4AA9000
heap
page read and write
DCB000
heap
page read and write
2A3F000
heap
page read and write
C09000
heap
page read and write
17B0000
heap
page read and write
DD1000
heap
page read and write
17B0000
heap
page read and write
C1D000
heap
page read and write
F1E000
heap
page read and write
DD8000
heap
page read and write
DBA000
heap
page read and write
16A0000
heap
page read and write
AC5000
heap
page read and write
17B0000
heap
page read and write
26CF000
trusted library allocation
page read and write
A7F000
stack
page read and write
DFC000
heap
page read and write
F34000
heap
page read and write
162E000
heap
page read and write
F46000
heap
page read and write
11AD000
heap
page read and write
17B0000
heap
page read and write
2A34000
heap
page read and write
E0B000
heap
page read and write
1032000
heap
page read and write
DBC000
heap
page read and write
C0D000
heap
page read and write
17C3000
heap
page read and write
C28000
heap
page read and write
D13000
heap
page read and write
17B0000
heap
page read and write
DFC000
heap
page read and write
C16000
heap
page read and write
2A23000
heap
page read and write
C11000
heap
page read and write
D03000
heap
page read and write
C24000
heap
page read and write
7FF6D8351000
unkown
page readonly
16EF000
heap
page read and write
C16000
heap
page read and write
F19000
heap
page read and write
17C0000
heap
page read and write
DFC000
heap
page read and write
D24000
heap
page read and write
1192000
heap
page read and write
DAF000
heap
page read and write
C3B000
heap
page read and write
AD9000
heap
page read and write
F18000
heap
page read and write
2A3F000
heap
page read and write
17E1000
heap
page read and write
C05000
heap
page read and write
D13000
heap
page read and write
AA6000
heap
page read and write
F28000
heap
page read and write
DA0000
heap
page read and write
D97000
heap
page read and write
F46000
heap
page read and write
17C6000
heap
page read and write
C32000
heap
page read and write
16EF000
heap
page read and write
17E1000
heap
page read and write
15CF000
heap
page read and write
29F8000
heap
page read and write
16A0000
heap
page read and write
A7C000
heap
page read and write
F18000
heap
page read and write
D39000
heap
page read and write
1425000
heap
page read and write
157D000
heap
page read and write
2A0E000
heap
page read and write
AD9000
heap
page read and write
D0C000
heap
page read and write
2A0E000
heap
page read and write
17A1000
heap
page read and write
17C0000
heap
page read and write
CE8000
heap
page read and write
BA0000
heap
page read and write
AD9000
heap
page read and write
17CB000
heap
page read and write
E0F000
heap
page read and write
A7C000
heap
page read and write
2C7D000
heap
page read and write
BE6000
heap
page read and write
DAB000
heap
page read and write
14D7000
heap
page read and write
18DD000
heap
page read and write
D85000
heap
page read and write
C24000
heap
page read and write
D10000
heap
page read and write
D90000
heap
page read and write
1586000
heap
page read and write
DAF000
heap
page read and write
1320000
heap
page read and write
ABD000
heap
page read and write
CF8000
heap
page read and write
F34000
heap
page read and write
7FF6D8342000
unkown
page readonly
D0C000
heap
page read and write
BC8000
heap
page read and write
7FF6D8321000
unkown
page execute read
17D4000
heap
page read and write
11BC000
heap
page read and write
DFC000
heap
page read and write
BD3000
heap
page read and write
F3C000
heap
page read and write
AA2000
heap
page read and write
D85000
heap
page read and write
DD8000
heap
page read and write
C3B000
heap
page read and write
16EF000
heap
page read and write
E0B000
heap
page read and write
DA0000
heap
page read and write
D4A000
heap
page read and write
169C000
heap
page read and write
1445000
heap
page read and write
1048000
heap
page read and write
AA2000
heap
page read and write
1703000
heap
page read and write
E0F000
heap
page read and write
AC5000
heap
page read and write
16A0000
heap
page read and write
C44000
heap
page read and write
ABD000
heap
page read and write
D07000
heap
page read and write
1035000
heap
page read and write
17C0000
heap
page read and write
14A5000
heap
page read and write
D0B000
heap
page read and write
17E1000
heap
page read and write
17C3000
heap
page read and write
F34000
heap
page read and write
C51000
heap
page read and write
C24000
heap
page read and write
17B0000
heap
page read and write
DAB000
heap
page read and write
C0D000
heap
page read and write
17C3000
heap
page read and write
17DC000
heap
page read and write
BF1000
heap
page read and write
DD8000
heap
page read and write
F3E000
heap
page read and write
E0F000
heap
page read and write
C16000
heap
page read and write
D69000
heap
page read and write
CF7000
heap
page read and write
DB7000
heap
page read and write
143A000
heap
page read and write
29FC000
heap
page read and write
2C81000
heap
page read and write
F34000
heap
page read and write
ADD000
heap
page read and write
DB7000
heap
page read and write
11A6000
heap
page read and write
17C0000
heap
page read and write
D69000
heap
page read and write
7FF6D8350000
unkown
page read and write
13E1000
heap
page read and write
D00000
heap
page read and write
26CF000
trusted library allocation
page read and write
17D4000
heap
page read and write
17DC000
heap
page read and write
17E1000
heap
page read and write
17D4000
heap
page read and write
F3E000
heap
page read and write
2A30000
heap
page read and write
119E000
heap
page read and write
1192000
heap
page read and write
E0B000
heap
page read and write
11D3000
heap
page read and write
17E1000
heap
page read and write
C0D000
heap
page read and write
17DC000
heap
page read and write
DEC000
heap
page read and write
D0C000
heap
page read and write
D52000
heap
page read and write
17E1000
heap
page read and write
CEC000
heap
page read and write
DC3000
heap
page read and write
5E42000
heap
page read and write
17E1000
heap
page read and write
C05000
heap
page read and write
DD8000
heap
page read and write
F46000
heap
page read and write
14E1000
heap
page read and write
D0C000
heap
page read and write
7FF6D834D000
unkown
page read and write
C0D000
heap
page read and write
C01000
heap
page read and write
AC5000
heap
page read and write
DA8000
heap
page read and write
DB7000
heap
page read and write
F3E000
heap
page read and write
7FF6D834F000
unkown
page readonly
DBC000
heap
page read and write
2A33000
heap
page read and write
17D0000
heap
page read and write
17C0000
heap
page read and write
AE3000
heap
page read and write
168D000
heap
page read and write
E0B000
heap
page read and write
F18000
heap
page read and write
D4A000
heap
page read and write
11BC000
heap
page read and write
F3E000
heap
page read and write
DDD000
heap
page read and write
CE8000
heap
page read and write
17C0000
heap
page read and write
C68000
heap
page read and write
BF5000
heap
page read and write
17C0000
heap
page read and write
D90000
heap
page read and write
7FF6D8350000
unkown
page write copy
17DC000
heap
page read and write
C16000
heap
page read and write
F44000
heap
page read and write
D24000
heap
page read and write
ABD000
heap
page read and write
139B000
heap
page read and write
F1C000
heap
page read and write
F2C000
heap
page read and write
DD8000
heap
page read and write
17DC000
heap
page read and write
16E5000
heap
page read and write
2A30000
heap
page read and write
17B0000
heap
page read and write
A9D000
heap
page read and write
F44000
heap
page read and write
169D000
heap
page read and write
D24000
heap
page read and write
1780000
heap
page read and write
C49000
heap
page read and write
DEC000
heap
page read and write
E0F000
heap
page read and write
D85000
heap
page read and write
DD8000
heap
page read and write
17D0000
heap
page read and write
DAF000
heap
page read and write
17E1000
heap
page read and write
17B0000
heap
page read and write
1032000
heap
page read and write
16CF000
heap
page read and write
1703000
heap
page read and write
17E1000
heap
page read and write
17E1000
heap
page read and write
D5A000
heap
page read and write
1173000
heap
page read and write
F3D000
heap
page read and write
ABD000
heap
page read and write
AB9000
heap
page read and write
C2F000
heap
page read and write
C3C000
heap
page read and write
C3B000
heap
page read and write
169C000
heap
page read and write
F0C000
heap
page read and write
169D000
heap
page read and write
17C6000
heap
page read and write
17C5000
heap
page read and write
E0F000
heap
page read and write
F28000
heap
page read and write
11A1000
heap
page read and write
E0B000
heap
page read and write
ABD000
heap
page read and write
17C0000
heap
page read and write
D1D000
heap
page read and write
1648000
heap
page read and write
17B0000
heap
page read and write
F19000
heap
page read and write
1048000
heap
page read and write
139F000
heap
page read and write
F23000
heap
page read and write
16BF000
heap
page read and write
17B0000
heap
page read and write
DCB000
heap
page read and write
C24000
heap
page read and write
BD3000
heap
page read and write
CF8000
heap
page read and write
1032000
heap
page read and write
A7D000
heap
page read and write
1191000
heap
page read and write
17C0000
heap
page read and write
C0D000
heap
page read and write
DED000
heap
page read and write
1513000
heap
page read and write
F29000
heap
page read and write
17C3000
heap
page read and write
11BC000
heap
page read and write
BF1000
heap
page read and write
BF5000
heap
page read and write
14F1000
heap
page read and write
17D0000
heap
page read and write
17D4000
heap
page read and write
A92000
heap
page read and write
C16000
heap
page read and write
F2C000
heap
page read and write
66640000
unkown
page readonly
666F7000
unkown
page read and write
DBF000
heap
page read and write
164B000
heap
page read and write
D45000
heap
page read and write
17DC000
heap
page read and write
F44000
heap
page read and write
C30000
heap
page read and write
D0C000
heap
page read and write
D00000
heap
page read and write
AA2000
heap
page read and write
DD8000
heap
page read and write
DC3000
heap
page read and write
2A2A000
heap
page read and write
DEC000
heap
page read and write
11DF000
heap
page read and write
17C5000
heap
page read and write
C24000
heap
page read and write
F1C000
heap
page read and write
7FF6D8350000
unkown
page read and write
17D4000
heap
page read and write
DA0000
heap
page read and write
1394000
heap
page read and write
17DC000
heap
page read and write
2A38000
heap
page read and write
C3B000
heap
page read and write
A8D000
heap
page read and write
D39000
heap
page read and write
BFD000
heap
page read and write
DEC000
heap
page read and write
16E5000
heap
page read and write
AC5000
heap
page read and write
D13000
heap
page read and write
2A0E000
heap
page read and write
17D0000
heap
page read and write
136C000
heap
page read and write
BC8000
heap
page read and write
50E4000
heap
page read and write
D07000
heap
page read and write
AD9000
heap
page read and write
F2C000
heap
page read and write
17B0000
heap
page read and write
57B000
heap
page read and write
17D4000
heap
page read and write
17B0000
heap
page read and write
CE8000
heap
page read and write
1395000
heap
page read and write
17DC000
heap
page read and write
1048000
heap
page read and write
17C0000
heap
page read and write
17DC000
heap
page read and write
17C6000
heap
page read and write
BF5000
heap
page read and write
15D4000
heap
page read and write
BE1000
heap
page read and write
AC5000
heap
page read and write
4CEF000
heap
page read and write
1158000
heap
page read and write
7FF6D8350000
unkown
page write copy
F19000
heap
page read and write
C16000
heap
page read and write
17C1000
heap
page read and write
17C0000
heap
page read and write
E0F000
heap
page read and write
2A0E000
heap
page read and write
17E1000
heap
page read and write
C01000
heap
page read and write
17D4000
heap
page read and write
11AD000
heap
page read and write
AC5000
heap
page read and write
2686000
trusted library allocation
page read and write
A38000
heap
page read and write
F44000
heap
page read and write
ABD000
heap
page read and write
CFC000
heap
page read and write
5E42000
heap
page read and write
AD9000
heap
page read and write
C24000
heap
page read and write
DD1000
heap
page read and write
17E1000
heap
page read and write
E0F000
heap
page read and write
14D7000
heap
page read and write
D52000
heap
page read and write
1048000
heap
page read and write
11B6000
heap
page read and write
17D0000
heap
page read and write
AD1000
heap
page read and write
BBE000
heap
page read and write
D1D000
heap
page read and write
87F000
stack
page read and write
14D7000
heap
page read and write
C0D000
heap
page read and write
F2C000
heap
page read and write
DB7000
heap
page read and write
17C3000
heap
page read and write
29FC000
heap
page read and write
2686000
trusted library allocation
page read and write
11B6000
heap
page read and write
17B0000
heap
page read and write
BDC000
heap
page read and write
17C6000
heap
page read and write
16A0000
heap
page read and write
DBF000
heap
page read and write
F28000
heap
page read and write
17C5000
heap
page read and write
2C3C000
heap
page read and write
C84000
heap
page read and write
666FA000
unkown
page readonly
F3E000
heap
page read and write
17E1000
heap
page read and write
DBC000
heap
page read and write
D24000
heap
page read and write
7FF6D8321000
unkown
page execute read
DA0000
heap
page read and write
17D0000
heap
page read and write
CE8000
heap
page read and write
17C6000
heap
page read and write
AAD000
heap
page read and write
BB3000
heap
page read and write
1020000
heap
page read and write
7FF6D8351000
unkown
page readonly
F46000
heap
page read and write
17D0000
heap
page read and write
DBF000
heap
page read and write
DAB000
heap
page read and write
17C0000
heap
page read and write
17B0000
heap
page read and write
16A5000
heap
page read and write
D85000
heap
page read and write
17B0000
heap
page read and write
DEC000
heap
page read and write
ABD000
heap
page read and write
AD9000
heap
page read and write
DA1000
heap
page read and write
17D4000
heap
page read and write
2C7D000
heap
page read and write
DC3000
heap
page read and write
F44000
heap
page read and write
F28000
heap
page read and write
17C0000
heap
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
DFC000
heap
page read and write
CE8000
heap
page read and write
17C6000
heap
page read and write
17C0000
heap
page read and write
A93000
heap
page read and write
9B0000
heap
page read and write
51A1000
heap
page read and write
BF1000
heap
page read and write
D24000
heap
page read and write
D13000
heap
page read and write
169D000
heap
page read and write
157D000
heap
page read and write
D24000
heap
page read and write
17D0000
heap
page read and write
D24000
heap
page read and write
29FC000
heap
page read and write
17E1000
heap
page read and write
F29000
heap
page read and write
BE4000
heap
page read and write
F7C000
stack
page read and write
ABD000
heap
page read and write
17E1000
heap
page read and write
DEC000
heap
page read and write
17E1000
heap
page read and write
17C0000
heap
page read and write
431C000
heap
page read and write
17D0000
heap
page read and write
DD8000
heap
page read and write
D4A000
heap
page read and write
16A0000
heap
page read and write
C24000
heap
page read and write
94F000
heap
page read and write
1048000
heap
page read and write
66702000
unkown
page execute
DD8000
heap
page read and write
17E1000
heap
page read and write
E0F000
heap
page read and write
29FC000
heap
page read and write
17E1000
heap
page read and write
1048000
heap
page read and write
17E1000
heap
page read and write
F1B000
heap
page read and write
2A33000
heap
page read and write
D85000
heap
page read and write
C3B000
heap
page read and write
A7F000
heap
page read and write
DC3000
heap
page read and write
C16000
heap
page read and write
D85000
heap
page read and write
1169000
heap
page read and write
137F000
stack
page read and write
97D000
heap
page read and write
17DC000
heap
page read and write
C05000
heap
page read and write
1048000
heap
page read and write
F46000
heap
page read and write
F09000
heap
page read and write
AA2000
heap
page read and write
CFB000
heap
page read and write
C0D000
heap
page read and write
DBC000
heap
page read and write
2951000
heap
page read and write
E0B000
heap
page read and write
1035000
heap
page read and write
F18000
heap
page read and write
DD1000
heap
page read and write
D07000
heap
page read and write
1182000
heap
page read and write
CF7000
heap
page read and write
D69000
heap
page read and write
D07000
heap
page read and write
1048000
heap
page read and write
157D000
heap
page read and write
CF8000
heap
page read and write
BE4000
heap
page read and write
11BC000
heap
page read and write
16E5000
heap
page read and write
11BA000
heap
page read and write
17D0000
heap
page read and write
AE3000
heap
page read and write
CE8000
heap
page read and write
AD9000
heap
page read and write
BE2000
heap
page read and write
D17000
heap
page read and write
29FC000
heap
page read and write
E0F000
heap
page read and write
7FF6D8342000
unkown
page readonly
F34000
heap
page read and write
F28000
heap
page read and write
DD8000
heap
page read and write
AD9000
heap
page read and write
7FF6D8321000
unkown
page execute read
D4A000
heap
page read and write
7FF6D8342000
unkown
page readonly
17D4000
heap
page read and write
C32000
heap
page read and write
E0F000
heap
page read and write
17DC000
heap
page read and write
17D4000
heap
page read and write
2C81000
heap
page read and write
14B7000
heap
page read and write
17C5000
heap
page read and write
C30000
heap
page read and write
1703000
heap
page read and write
17C0000
heap
page read and write
299D000
heap
page read and write
F46000
heap
page read and write
D13000
heap
page read and write
1BD8000
heap
page read and write
F18000
heap
page read and write
1048000
heap
page read and write
AC5000
heap
page read and write
F34000
heap
page read and write
F44000
heap
page read and write
11BA000
heap
page read and write
16A1000
heap
page read and write
666F7000
unkown
page read and write
BE9000
heap
page read and write
F3E000
heap
page read and write
17C6000
heap
page read and write
2680000
trusted library allocation
page read and write
2C81000
heap
page read and write
17B0000
heap
page read and write
2A1E000
heap
page read and write
DFC000
heap
page read and write
C16000
heap
page read and write
1875000
heap
page read and write
DA0000
heap
page read and write
17E1000
heap
page read and write
AD9000
heap
page read and write
DEC000
heap
page read and write
DEC000
heap
page read and write
DBC000
heap
page read and write
17B0000
heap
page read and write
CF7000
heap
page read and write
D0B000
heap
page read and write
AD9000
heap
page read and write
BF1000
heap
page read and write
D90000
heap
page read and write
DFC000
heap
page read and write
17D4000
heap
page read and write
1E2B000
heap
page read and write
14FF000
stack
page read and write
F44000
heap
page read and write
C3B000
heap
page read and write
D13000
heap
page read and write
D76000
heap
page read and write
17E1000
heap
page read and write
17C6000
heap
page read and write
BFD000
heap
page read and write
CF7000
heap
page read and write
1C0000
heap
page read and write
F3D000
heap
page read and write
A92000
heap
page read and write
D78000
heap
page read and write
2686000
trusted library allocation
page read and write
DFC000
heap
page read and write
DCB000
heap
page read and write
17C0000
heap
page read and write
1760000
heap
page read and write
1191000
heap
page read and write
1039000
heap
page read and write
17E1000
heap
page read and write
F09000
heap
page read and write
D24000
heap
page read and write
2A30000
heap
page read and write
F18000
heap
page read and write
AC5000
heap
page read and write
ABD000
heap
page read and write
11A6000
heap
page read and write
F3E000
heap
page read and write
16A0000
heap
page read and write
F09000
heap
page read and write
DD1000
heap
page read and write
DFC000
heap
page read and write
CF8000
heap
page read and write
DEC000
heap
page read and write
DBF000
heap
page read and write
1642000
heap
page read and write
BE2000
heap
page read and write
169D000
heap
page read and write
F09000
heap
page read and write
F28000
heap
page read and write
F28000
heap
page read and write
17DC000
heap
page read and write
F28000
heap
page read and write
DCB000
heap
page read and write
7FF6D8320000
unkown
page readonly
DD8000
heap
page read and write
15D4000
heap
page read and write
157C000
heap
page read and write
F2C000
heap
page read and write
4486000
heap
page read and write
1399000
heap
page read and write
D24000
heap
page read and write
4D6F000
heap
page read and write
F46000
heap
page read and write
17E1000
heap
page read and write
2A0E000
heap
page read and write
CF7000
heap
page read and write
DC3000
heap
page read and write
DC3000
heap
page read and write
EF0000
heap
page read and write
1425000
heap
page read and write
C24000
heap
page read and write
18B5000
heap
page read and write
11AD000
heap
page read and write
1035000
heap
page read and write
17E1000
heap
page read and write
D69000
heap
page read and write
17C0000
heap
page read and write
C3B000
heap
page read and write
F3E000
heap
page read and write
11DF000
heap
page read and write
DA8000
heap
page read and write
F19000
heap
page read and write
C0D000
heap
page read and write
1053000
heap
page read and write
16A1000
heap
page read and write
29EC000
heap
page read and write
2686000
trusted library allocation
page read and write
17C0000
heap
page read and write
17D4000
heap
page read and write
DBC000
heap
page read and write
AD9000
heap
page read and write
1C29000
heap
page read and write
BF1000
heap
page read and write
BF1000
heap
page read and write
D24000
heap
page read and write
11A6000
heap
page read and write
1172000
heap
page read and write
BD3000
heap
page read and write
17C3000
heap
page read and write
17C3000
heap
page read and write
17E1000
heap
page read and write
AAE000
heap
page read and write
2A3F000
heap
page read and write
1528000
heap
page read and write
17DC000
heap
page read and write
E0B000
heap
page read and write
26CF000
trusted library allocation
page read and write
111F000
stack
page read and write
16A0000
heap
page read and write
F44000
heap
page read and write
2C7D000
heap
page read and write
AC0000
heap
page read and write
D85000
heap
page read and write
16A0000
heap
page read and write
42A4000
heap
page read and write
17E1000
heap
page read and write
4B6000
heap
page read and write
DFC000
heap
page read and write
16CF000
heap
page read and write
E5C000
heap
page read and write
DB0000
heap
page read and write
17B0000
heap
page read and write
DC3000
heap
page read and write
666F4000
unkown
page write copy
E0B000
heap
page read and write
E0F000
heap
page read and write
AC5000
heap
page read and write
DEC000
heap
page read and write
BE9000
heap
page read and write
CF8000
heap
page read and write
51F4000
heap
page read and write
C16000
heap
page read and write
7FF6D8321000
unkown
page execute read
C01000
heap
page read and write
C0D000
heap
page read and write
11C4000
heap
page read and write
14D2000
heap
page read and write
C24000
heap
page read and write
F1B000
heap
page read and write
17D4000
heap
page read and write
11B6000
heap
page read and write
1048000
heap
page read and write
F18000
heap
page read and write
7FF6D8321000
unkown
page execute read
17C0000
heap
page read and write
C0D000
heap
page read and write
17D0000
heap
page read and write
17C6000
heap
page read and write
14D7000
heap
page read and write
DFC000
heap
page read and write
2080000
heap
page read and write
7FF6D8321000
unkown
page execute read
2A1E000
heap
page read and write
1048000
heap
page read and write
D69000
heap
page read and write
11BC000
heap
page read and write
169D000
heap
page read and write
17B0000
heap
page read and write
C47000
heap
page read and write
F18000
heap
page read and write
4CA5000
heap
page read and write
D17000
heap
page read and write
14D7000
heap
page read and write
D90000
heap
page read and write
1048000
heap
page read and write
C0D000
heap
page read and write
16CF000
heap
page read and write
AC5000
heap
page read and write
169C000
heap
page read and write
CE8000
heap
page read and write
EFE000
heap
page read and write
C58000
heap
page read and write
DC3000
heap
page read and write
C32000
heap
page read and write
D4A000
heap
page read and write
16CF000
heap
page read and write
127E000
heap
page read and write
D0E000
heap
page read and write
BE2000
heap
page read and write
ABD000
heap
page read and write
4F61000
heap
page read and write
145D000
heap
page read and write
CF7000
heap
page read and write
D7C000
heap
page read and write
7FF6D8321000
unkown
page execute read
DC3000
heap
page read and write
7FF6D8342000
unkown
page readonly
BD9000
heap
page read and write
DBC000
heap
page read and write
17E1000
heap
page read and write
7FF6D8350000
unkown
page write copy
F18000
heap
page read and write
CB2000
heap
page read and write
169C000
heap
page read and write
C24000
heap
page read and write
17B0000
heap
page read and write
CFF000
heap
page read and write
D2A000
heap
page read and write
D69000
heap
page read and write
ABD000
heap
page read and write
119D000
heap
page read and write
17DC000
heap
page read and write
2680000
trusted library allocation
page read and write
C92000
heap
page read and write
AC5000
heap
page read and write
C28000
heap
page read and write
DB7000
heap
page read and write
AA6000
heap
page read and write
C28000
heap
page read and write
ABD000
heap
page read and write
BF1000
heap
page read and write
2A0E000
heap
page read and write
DA8000
heap
page read and write
11D7000
heap
page read and write
666D1000
unkown
page readonly
D0A000
heap
page read and write
F3C000
heap
page read and write
16A0000
heap
page read and write
1048000
heap
page read and write
E0B000
heap
page read and write
7FF6D8320000
unkown
page readonly
14DD000
heap
page read and write
1035000
heap
page read and write
11BA000
heap
page read and write
50A0000
heap
page read and write
DC3000
heap
page read and write
10EE000
heap
page read and write
17E1000
heap
page read and write
16A0000
heap
page read and write
AA2000
heap
page read and write
2A33000
heap
page read and write
2310000
trusted library allocation
page read and write
7FF6D834D000
unkown
page write copy
BF1000
heap
page read and write
66706000
unkown
page readonly
BE2000
heap
page read and write
D13000
heap
page read and write
17DC000
heap
page read and write
D41000
heap
page read and write
BE2000
heap
page read and write
1048000
heap
page read and write
DD8000
heap
page read and write
17C0000
heap
page read and write
DEC000
heap
page read and write
F3D000
heap
page read and write
BD3000
heap
page read and write
2A3D000
heap
page read and write
D01000
heap
page read and write
11DF000
heap
page read and write
16A0000
heap
page read and write
ABD000
heap
page read and write
BE2000
heap
page read and write
DAF000
heap
page read and write
17C5000
heap
page read and write
BFD000
heap
page read and write
A92000
heap
page read and write
CFC000
heap
page read and write
17C3000
heap
page read and write
C05000
heap
page read and write
17E1000
heap
page read and write
BF1000
heap
page read and write
DB0000
heap
page read and write
16CF000
heap
page read and write
D24000
heap
page read and write
16BF000
heap
page read and write
11AD000
heap
page read and write
AC5000
heap
page read and write
2CAB000
heap
page read and write
17C6000
heap
page read and write
DFC000
heap
page read and write
ABD000
heap
page read and write
BE7000
heap
page read and write
1192000
heap
page read and write
D07000
heap
page read and write
17DC000
heap
page read and write
DD8000
heap
page read and write
CF8000
heap
page read and write
16A1000
heap
page read and write
D17000
heap
page read and write
666F7000
unkown
page read and write
17D4000
heap
page read and write
17E1000
heap
page read and write
C28000
heap
page read and write
2A33000
heap
page read and write
DA8000
heap
page read and write
DFC000
heap
page read and write
26CF000
trusted library allocation
page read and write
DD8000
heap
page read and write
16B3000
heap
page read and write
C0D000
heap
page read and write
971000
heap
page read and write
DC3000
heap
page read and write
F44000
heap
page read and write
AAE000
heap
page read and write
F46000
heap
page read and write
1053000
heap
page read and write
CFB000
heap
page read and write
C05000
heap
page read and write
17E1000
heap
page read and write
C16000
heap
page read and write
CE8000
heap
page read and write
17E1000
heap
page read and write
5F60000
heap
page read and write
16EF000
heap
page read and write
16A0000
heap
page read and write
F44000
heap
page read and write
ACA000
heap
page read and write
C16000
heap
page read and write
D69000
heap
page read and write
DED000
heap
page read and write
2A2A000
heap
page read and write
2A22000
heap
page read and write
DD1000
heap
page read and write
17E1000
heap
page read and write
C2F000
heap
page read and write
29FF000
heap
page read and write
3063000
heap
page read and write
1303000
heap
page read and write
CFD000
heap
page read and write
AA2000
heap
page read and write
C0D000
heap
page read and write
17B0000
heap
page read and write
D0B000
heap
page read and write
1035000
heap
page read and write
1699000
heap
page read and write
F34000
heap
page read and write
D24000
heap
page read and write
1048000
heap
page read and write
16A0000
heap
page read and write
C05000
heap
page read and write
2A3F000
heap
page read and write
DCB000
heap
page read and write
AD9000
heap
page read and write
A7C000
heap
page read and write
C2C000
heap
page read and write
17B0000
heap
page read and write
26EF000
heap
page read and write
C16000
heap
page read and write
16E5000
heap
page read and write
17C0000
heap
page read and write
F18000
heap
page read and write
E0F000
heap
page read and write
17C0000
heap
page read and write
5F2D000
heap
page read and write
F44000
heap
page read and write
D24000
heap
page read and write
DEC000
heap
page read and write
DD8000
heap
page read and write
DEC000
heap
page read and write
17DC000
heap
page read and write
D48000
heap
page read and write
17C0000
heap
page read and write
F3E000
heap
page read and write
970000
heap
page read and write
F1D000
heap
page read and write
2530000
trusted library allocation
page read and write
C16000
heap
page read and write
D58000
heap
page read and write
4480000
heap
page read and write
1048000
heap
page read and write
CF8000
heap
page read and write
D69000
heap
page read and write
D13000
heap
page read and write
185E000
heap
page read and write
17E1000
heap
page read and write
F1D000
heap
page read and write
BF1000
heap
page read and write
C3B000
heap
page read and write
DAD000
heap
page read and write
CF7000
heap
page read and write
DEC000
heap
page read and write
D07000
heap
page read and write
17E1000
heap
page read and write
17E1000
heap
page read and write
D24000
heap
page read and write
118D000
heap
page read and write
17C2000
heap
page read and write
29FC000
heap
page read and write
E0F000
heap
page read and write
17B0000
heap
page read and write
16A1000
heap
page read and write
17E1000
heap
page read and write
1703000
heap
page read and write
17B0000
heap
page read and write
DFC000
heap
page read and write
BFD000
heap
page read and write
17DC000
heap
page read and write
17B0000
heap
page read and write
C3B000
heap
page read and write
17D4000
heap
page read and write
E0B000
heap
page read and write
17E1000
heap
page read and write
D85000
heap
page read and write
F1E000
heap
page read and write
DA8000
heap
page read and write
ABD000
heap
page read and write
DBC000
heap
page read and write
17C3000
heap
page read and write
17E1000
heap
page read and write
ABD000
heap
page read and write
DA8000
heap
page read and write
DB0000
heap
page read and write
C30000
heap
page read and write
17C3000
heap
page read and write
D07000
heap
page read and write
ABD000
heap
page read and write
118D000
heap
page read and write
11A2000
heap
page read and write
1441000
heap
page read and write
11BC000
heap
page read and write
D17000
heap
page read and write
DB7000
heap
page read and write
D69000
heap
page read and write
E0F000
heap
page read and write
AA6000
heap
page read and write
CF3000
heap
page read and write
A92000
heap
page read and write
D4A000
heap
page read and write
E0F000
heap
page read and write
17DC000
heap
page read and write
1E8000
heap
page read and write
E0F000
heap
page read and write
BF5000
heap
page read and write
DBC000
heap
page read and write
66640000
unkown
page readonly
CF7000
heap
page read and write
F34000
heap
page read and write
17D4000
heap
page read and write
11B6000
heap
page read and write
1390000
heap
page read and write
C28000
heap
page read and write
AD9000
heap
page read and write
17E1000
heap
page read and write
F3E000
heap
page read and write
7FF6D8351000
unkown
page readonly
7FF6D834D000
unkown
page write copy
BE7000
heap
page read and write
1320000
heap
page read and write
7FF6D8351000
unkown
page readonly
17D0000
heap
page read and write
D13000
heap
page read and write
158C000
heap
page read and write
2A30000
heap
page read and write
C0D000
heap
page read and write
DB0000
heap
page read and write
1429000
heap
page read and write
BE2000
heap
page read and write
DD8000
heap
page read and write
4FA5000
heap
page read and write
666F7000
unkown
page read and write
14F1000
heap
page read and write
F46000
heap
page read and write
17E1000
heap
page read and write
BF1000
heap
page read and write
16EF000
heap
page read and write
7FF6D8350000
unkown
page read and write
17DC000
heap
page read and write
17C3000
heap
page read and write
1164000
heap
page read and write
2A0E000
heap
page read and write
1035000
heap
page read and write
D24000
heap
page read and write
17D4000
heap
page read and write
D69000
heap
page read and write
DD8000
heap
page read and write
11BC000
heap
page read and write
D13000
heap
page read and write
DAF000
heap
page read and write
A7C000
heap
page read and write
16EF000
heap
page read and write
AD9000
heap
page read and write
1053000
heap
page read and write
7FF6D8320000
unkown
page readonly
DC3000
heap
page read and write
F46000
heap
page read and write
17E1000
heap
page read and write
DC3000
heap
page read and write
17B0000
heap
page read and write
4DD8000
heap
page read and write
DB0000
heap
page read and write
2A2A000
heap
page read and write
F34000
heap
page read and write
CFB000
heap
page read and write
C24000
heap
page read and write
17C0000
heap
page read and write
DEC000
heap
page read and write
C05000
heap
page read and write
F18000
heap
page read and write
AAE000
heap
page read and write
D97000
heap
page read and write
DBF000
heap
page read and write
F44000
heap
page read and write
14E9000
heap
page read and write
F44000
heap
page read and write
DD8000
heap
page read and write
F46000
heap
page read and write
169D000
heap
page read and write
F1B000
heap
page read and write
14D7000
heap
page read and write
16EF000
heap
page read and write
DEC000
heap
page read and write
73C000
stack
page read and write
DED000
heap
page read and write
1048000
heap
page read and write
DEC000
heap
page read and write
D07000
heap
page read and write
DBC000
heap
page read and write
BAB000
heap
page read and write
BF1000
heap
page read and write
BE2000
heap
page read and write
C0D000
heap
page read and write
17D0000
heap
page read and write
E0B000
heap
page read and write
115C000
heap
page read and write
17C0000
heap
page read and write
DED000
heap
page read and write
F19000
heap
page read and write
11BC000
heap
page read and write
DD8000
heap
page read and write
D24000
heap
page read and write
17DC000
heap
page read and write
F46000
heap
page read and write
E0F000
heap
page read and write
BCC000
heap
page read and write
144B000
heap
page read and write
1172000
heap
page read and write
2A37000
heap
page read and write
C28000
heap
page read and write
29FF000
heap
page read and write
ABD000
heap
page read and write
17C6000
heap
page read and write
AE1000
heap
page read and write
DEC000
heap
page read and write
1828000
heap
page read and write
F46000
heap
page read and write
DBC000
heap
page read and write
2C18000
heap
page read and write
CF8000
heap
page read and write
DFC000
heap
page read and write
16EF000
heap
page read and write
13B7000
heap
page read and write
AC5000
heap
page read and write
16B4000
heap
page read and write
D17000
heap
page read and write
7FF6D834D000
unkown
page write copy
DA8000
heap
page read and write
F27000
heap
page read and write
17C3000
heap
page read and write
17E1000
heap
page read and write
F38000
heap
page read and write
17C0000
heap
page read and write
C28000
heap
page read and write
17C0000
heap
page read and write
F28000
heap
page read and write
F28000
heap
page read and write
17E1000
heap
page read and write
CF7000
heap
page read and write
BE4000
heap
page read and write
C0D000
heap
page read and write
C16000
heap
page read and write
1181000
heap
page read and write
C0D000
heap
page read and write
BF1000
heap
page read and write
16A0000
heap
page read and write
C05000
heap
page read and write
17B0000
heap
page read and write
DB3000
heap
page read and write
2A3F000
heap
page read and write
C16000
heap
page read and write
14B9000
heap
page read and write
C2C000
heap
page read and write
ABD000
heap
page read and write
DD1000
heap
page read and write
1048000
heap
page read and write
C05000
heap
page read and write
F28000
heap
page read and write
A41000
heap
page read and write
E0F000
heap
page read and write
F34000
heap
page read and write
11B6000
heap
page read and write
CF8000
heap
page read and write
17D0000
heap
page read and write
BFD000
heap
page read and write
14D7000
heap
page read and write
C0D000
heap
page read and write
17CB000
heap
page read and write
C16000
heap
page read and write
E0B000
heap
page read and write
1673000
heap
page read and write
DAF000
heap
page read and write
66640000
unkown
page readonly
16AB000
heap
page read and write
2A1E000
heap
page read and write
ABD000
heap
page read and write
E0F000
heap
page read and write
F46000
heap
page read and write
BFD000
heap
page read and write
C16000
heap
page read and write
DB0000
heap
page read and write
DD8000
heap
page read and write
F09000
heap
page read and write
17DC000
heap
page read and write
DFC000
heap
page read and write
2310000
trusted library allocation
page read and write
2BE8000
heap
page read and write
A92000
heap
page read and write
17B0000
heap
page read and write
17E1000
heap
page read and write
179E000
heap
page read and write
4E3F000
heap
page read and write
17E1000
heap
page read and write
17C6000
heap
page read and write
DB0000
heap
page read and write
DEC000
heap
page read and write
DD8000
heap
page read and write
12F8000
heap
page read and write
BFD000
heap
page read and write
F2C000
heap
page read and write
17C0000
heap
page read and write
BF4000
heap
page read and write
DA8000
heap
page read and write
17B0000
heap
page read and write
CA2000
heap
page read and write
17E1000
heap
page read and write
A39000
heap
page read and write
EFD000
heap
page read and write
BF7000
heap
page read and write
17C6000
heap
page read and write
F3D000
heap
page read and write
DCB000
heap
page read and write
5E5A000
heap
page read and write
116A000
heap
page read and write
17E1000
heap
page read and write
F34000
heap
page read and write
17C3000
heap
page read and write
AA6000
heap
page read and write
CE8000
heap
page read and write
ABD000
heap
page read and write
17E1000
heap
page read and write
16A0000
heap
page read and write
D85000
heap
page read and write
CEC000
heap
page read and write
F46000
heap
page read and write
EDC000
heap
page read and write
B9C000
heap
page read and write
11B6000
heap
page read and write
26CF000
trusted library allocation
page read and write
2A22000
heap
page read and write
DD8000
heap
page read and write
1048000
heap
page read and write
2C85000
heap
page read and write
17C0000
heap
page read and write
DA8000
heap
page read and write
17E1000
heap
page read and write
A92000
heap
page read and write
F18000
heap
page read and write
F1A000
heap
page read and write
17C6000
heap
page read and write
2A18000
heap
page read and write
2A38000
heap
page read and write
F28000
heap
page read and write
C58000
heap
page read and write
29FC000
heap
page read and write
A93000
heap
page read and write
1633000
heap
page read and write
137C000
heap
page read and write
BC8000
heap
page read and write
17C6000
heap
page read and write
17C6000
heap
page read and write
11BC000
heap
page read and write
CF8000
heap
page read and write
C16000
heap
page read and write
17C0000
heap
page read and write
169D000
heap
page read and write
11AD000
heap
page read and write
11B6000
heap
page read and write
1035000
heap
page read and write
17C5000
heap
page read and write
DED000
heap
page read and write
DA8000
heap
page read and write
CFD000
heap
page read and write
17C3000
heap
page read and write
DB7000
heap
page read and write
17E1000
heap
page read and write
BEA000
heap
page read and write
DBF000
heap
page read and write
D85000
heap
page read and write
C3B000
heap
page read and write
17D0000
heap
page read and write
DD8000
heap
page read and write
D76000
heap
page read and write
17C3000
heap
page read and write
DCB000
heap
page read and write
DEC000
heap
page read and write
E0B000
heap
page read and write
D69000
heap
page read and write
2954000
heap
page read and write
666D1000
unkown
page readonly
DAB000
heap
page read and write
17C6000
heap
page read and write
1B0B000
heap
page read and write
7FF6D8342000
unkown
page readonly
E0F000
heap
page read and write
17C0000
heap
page read and write
DAB000
heap
page read and write
AC2000
heap
page read and write
F2C000
heap
page read and write
D24000
heap
page read and write
F28000
heap
page read and write
666F7000
unkown
page read and write
A97000
heap
page read and write
17B0000
heap
page read and write
17E1000
heap
page read and write
666F2000
unkown
page read and write
9BE000
heap
page read and write
17C8000
heap
page read and write
2974000
heap
page read and write
2A38000
heap
page read and write
1192000
heap
page read and write
D90000
heap
page read and write
123B000
heap
page read and write
DD8000
heap
page read and write
17E1000
heap
page read and write
17C3000
heap
page read and write
BFC000
heap
page read and write
EF0000
heap
page read and write
11B6000
heap
page read and write
DCB000
heap
page read and write
DAF000
heap
page read and write
BE4000
heap
page read and write
F34000
heap
page read and write
BF5000
heap
page read and write
D1D000
heap
page read and write
2A33000
heap
page read and write
17C6000
heap
page read and write
17C5000
heap
page read and write
DFC000
heap
page read and write
2A3F000
heap
page read and write
2680000
trusted library allocation
page read and write
1703000
heap
page read and write
AD9000
heap
page read and write
DB7000
heap
page read and write
F44000
heap
page read and write
D69000
heap
page read and write
17D4000
heap
page read and write
1333000
heap
page read and write
AAE000
heap
page read and write
C16000
heap
page read and write
E0F000
heap
page read and write
D0C000
heap
page read and write
D85000
heap
page read and write
16E9000
heap
page read and write
1198000
heap
page read and write
118E000
heap
page read and write
DFC000
heap
page read and write
11A2000
heap
page read and write
1166000
heap
page read and write
DB0000
heap
page read and write
BF1000
heap
page read and write
16FC000
heap
page read and write
1690000
heap
page read and write
A80000
heap
page read and write
11B6000
heap
page read and write
AD9000
heap
page read and write
17D0000
heap
page read and write
17D0000
heap
page read and write
C24000
heap
page read and write
AD9000
heap
page read and write
DB1000
heap
page read and write
D69000
heap
page read and write
C16000
heap
page read and write
D24000
heap
page read and write
16EF000
heap
page read and write
D69000
heap
page read and write
17E1000
heap
page read and write
C32000
heap
page read and write
3247000
heap
page read and write
2C81000
heap
page read and write
F34000
heap
page read and write
E0F000
heap
page read and write
2A3F000
heap
page read and write
7FF6D8320000
unkown
page readonly
DB7000
heap
page read and write
D90000
heap
page read and write
E0B000
heap
page read and write
D4A000
heap
page read and write
17B0000
heap
page read and write
169D000
heap
page read and write
DD8000
heap
page read and write
DD8000
heap
page read and write
16AD000
heap
page read and write
C3B000
heap
page read and write
17D0000
heap
page read and write
17E1000
heap
page read and write
F1E000
heap
page read and write
CAE000
heap
page read and write
7D0000
heap
page read and write
D90000
heap
page read and write
ABD000
heap
page read and write
11C2000
heap
page read and write
11BC000
heap
page read and write
C28000
heap
page read and write
158C000
heap
page read and write
2A3F000
heap
page read and write
11BC000
heap
page read and write
11B3000
heap
page read and write
DD8000
heap
page read and write
17C6000
heap
page read and write
DA0000
heap
page read and write
666F7000
unkown
page read and write
D13000
heap
page read and write
BDD000
heap
page read and write
DFC000
heap
page read and write
16A0000
heap
page read and write
11C9000
heap
page read and write
17C0000
heap
page read and write
F2C000
heap
page read and write
EDB000
heap
page read and write
DA0000
heap
page read and write
AA2000
heap
page read and write
DA8000
heap
page read and write
D2A000
heap
page read and write
D97000
heap
page read and write
37A2000
heap
page read and write
DC3000
heap
page read and write
17C6000
heap
page read and write
7FF6D8321000
unkown
page execute read
16A0000
heap
page read and write
116F000
heap
page read and write
F18000
heap
page read and write
F09000
heap
page read and write
139F000
heap
page read and write
DD1000
heap
page read and write
F2C000
heap
page read and write
DFC000
heap
page read and write
16A0000
heap
page read and write
DED000
heap
page read and write
17DC000
heap
page read and write
BBE000
heap
page read and write
BD3000
heap
page read and write
AD9000
heap
page read and write
D69000
heap
page read and write
AA1000
heap
page read and write
D85000
heap
page read and write
DC3000
heap
page read and write
1034000
heap
page read and write
29FC000
heap
page read and write
17D0000
heap
page read and write
DD8000
heap
page read and write
A93000
heap
page read and write
CFF000
heap
page read and write
17C0000
heap
page read and write
DD1000
heap
page read and write
11B6000
heap
page read and write
17C5000
heap
page read and write
17D0000
heap
page read and write
E0F000
heap
page read and write
D69000
heap
page read and write
C24000
heap
page read and write
DB9000
heap
page read and write
2A33000
heap
page read and write
C0D000
heap
page read and write
17C5000
heap
page read and write
666F2000
unkown
page read and write
5E34000
heap
page read and write
CE8000
heap
page read and write
17C2000
heap
page read and write
BF1000
heap
page read and write
F2C000
heap
page read and write
2A34000
heap
page read and write
17DC000
heap
page read and write
17D0000
heap
page read and write
169D000
heap
page read and write
1174000
heap
page read and write
D24000
heap
page read and write
11B6000
heap
page read and write
D97000
heap
page read and write
2B15000
heap
page read and write
DFC000
heap
page read and write
29EC000
heap
page read and write
E0B000
heap
page read and write
1586000
heap
page read and write
16E5000
heap
page read and write
16A0000
heap
page read and write
17E1000
heap
page read and write
DFC000
heap
page read and write
1048000
heap
page read and write
C16000
heap
page read and write
7FF6D8350000
unkown
page write copy
BE2000
heap
page read and write
F46000
heap
page read and write
17C0000
heap
page read and write
17D0000
heap
page read and write
119E000
heap
page read and write
17E1000
heap
page read and write
666F7000
unkown
page read and write
17D4000
heap
page read and write
BF1000
heap
page read and write
17C5000
heap
page read and write
DB4000
heap
page read and write
17C6000
heap
page read and write
17DC000
heap
page read and write
17C0000
heap
page read and write
26CF000
trusted library allocation
page read and write
DAB000
heap
page read and write
169D000
heap
page read and write
17B0000
heap
page read and write
1642000
heap
page read and write
ABD000
heap
page read and write
DD8000
heap
page read and write
17DC000
heap
page read and write
1440000
heap
page read and write
DFC000
heap
page read and write
1169000
heap
page read and write
17C3000
heap
page read and write
17C0000
heap
page read and write
17CB000
heap
page read and write
DEC000
heap
page read and write
11AD000
heap
page read and write
17C0000
heap
page read and write
C3B000
heap
page read and write
66706000
unkown
page readonly
DAF000
heap
page read and write
17DC000
heap
page read and write
AD9000
heap
page read and write
DCB000
heap
page read and write
D2C000
heap
page read and write
11B6000
heap
page read and write
F44000
heap
page read and write
164B000
heap
page read and write
AC5000
heap
page read and write
1275000
heap
page read and write
C3B000
heap
page read and write
F18000
heap
page read and write
17C3000
heap
page read and write
DAD000
heap
page read and write
C68000
heap
page read and write
A92000
heap
page read and write
F41000
heap
page read and write
DAF000
heap
page read and write
17C0000
heap
page read and write
11BA000
heap
page read and write
DA8000
heap
page read and write
17E1000
heap
page read and write
C29000
heap
page read and write
D35000
heap
page read and write
D24000
heap
page read and write
B84000
heap
page read and write
17D0000
heap
page read and write
DAA000
heap
page read and write
E0F000
heap
page read and write
DBC000
heap
page read and write
17DC000
heap
page read and write
DFC000
heap
page read and write
DFC000
heap
page read and write
BD3000
heap
page read and write
E0F000
heap
page read and write
A98000
heap
page read and write
2A30000
heap
page read and write
C0D000
heap
page read and write
17E1000
heap
page read and write
E0F000
heap
page read and write
17DC000
heap
page read and write
C2C000
heap
page read and write
DBF000
heap
page read and write
11BC000
heap
page read and write
17E1000
heap
page read and write
A92000
heap
page read and write
DA8000
heap
page read and write
D24000
heap
page read and write
1270000
heap
page read and write
1035000
heap
page read and write
15ED000
heap
page read and write
17D4000
heap
page read and write
C3B000
heap
page read and write
BFB000
heap
page read and write
17E1000
heap
page read and write
BF1000
heap
page read and write
BE2000
heap
page read and write
F18000
heap
page read and write
BDD000
heap
page read and write
1038000
heap
page read and write
1197000
heap
page read and write
2A37000
heap
page read and write
C30000
heap
page read and write
BFD000
heap
page read and write
11BA000
heap
page read and write
C0D000
heap
page read and write
16CF000
heap
page read and write
DFC000
heap
page read and write
2A30000
heap
page read and write
2686000
trusted library allocation
page read and write
C24000
heap
page read and write
DB0000
heap
page read and write
11DF000
heap
page read and write
16BF000
heap
page read and write
17C0000
heap
page read and write
17C6000
heap
page read and write
DD8000
heap
page read and write
DA8000
heap
page read and write
7FF6D8321000
unkown
page execute read
DB7000
heap
page read and write
5E93000
heap
page read and write
1053000
heap
page read and write
11B6000
heap
page read and write
1035000
heap
page read and write
167B000
heap
page read and write
A92000
heap
page read and write
17E1000
heap
page read and write
CFB000
heap
page read and write
1048000
heap
page read and write
1053000
heap
page read and write
1048000
heap
page read and write
17D4000
heap
page read and write
DBC000
heap
page read and write
DED000
heap
page read and write
17CB000
heap
page read and write
17C0000
heap
page read and write
BE1000
heap
page read and write
BE2000
heap
page read and write
DAB000
heap
page read and write
F19000
heap
page read and write
ABD000
heap
page read and write
4528000
heap
page read and write
AD9000
heap
page read and write
F28000
heap
page read and write
D0C000
heap
page read and write
CF7000
heap
page read and write
17E1000
heap
page read and write
AE3000
heap
page read and write
CFD000
heap
page read and write
8D1000
heap
page read and write
DD1000
heap
page read and write
CD6000
heap
page read and write
1182000
heap
page read and write
BFD000
heap
page read and write
A93000
heap
page read and write
CFE000
heap
page read and write
1048000
heap
page read and write
DA8000
heap
page read and write
16A0000
heap
page read and write
2C81000
heap
page read and write
17D0000
heap
page read and write
AE1000
heap
page read and write
C32000
heap
page read and write
4259000
heap
page read and write
17E1000
heap
page read and write
D69000
heap
page read and write
DFC000
heap
page read and write
17C3000
heap
page read and write
666FA000
unkown
page readonly
D00000
heap
page read and write
AD9000
heap
page read and write
F28000
heap
page read and write
DEC000
heap
page read and write
DA8000
heap
page read and write
2C81000
heap
page read and write
D13000
heap
page read and write
DFC000
heap
page read and write
C01000
heap
page read and write
17D4000
heap
page read and write
1BE8000
heap
page read and write
F3D000
heap
page read and write
C49000
heap
page read and write
E0B000
heap
page read and write
D24000
heap
page read and write
C24000
heap
page read and write
DA7000
heap
page read and write
BCF000
heap
page read and write
C16000
heap
page read and write
17C5000
heap
page read and write
17D4000
heap
page read and write
D17000
heap
page read and write
D69000
heap
page read and write
DCB000
heap
page read and write
119E000
heap
page read and write
F18000
heap
page read and write
C68000
heap
page read and write
DEC000
heap
page read and write
D41000
heap
page read and write
2A37000
heap
page read and write
4FF0000
heap
page read and write
17B0000
heap
page read and write
D69000
heap
page read and write
EEB000
heap
page read and write
14E9000
heap
page read and write
DEC000
heap
page read and write
D85000
heap
page read and write
E0B000
heap
page read and write
F2C000
heap
page read and write
14B7000
heap
page read and write
19CA000
heap
page read and write
17E1000
heap
page read and write
DFC000
heap
page read and write
1025000
heap
page read and write
17E1000
heap
page read and write
11B3000
heap
page read and write
17D0000
heap
page read and write
17C3000
heap
page read and write
D9F000
heap
page read and write
DCB000
heap
page read and write
DBC000
heap
page read and write
13E1000
heap
page read and write
BD9000
heap
page read and write
17C3000
heap
page read and write
CDF000
heap
page read and write
7FF6D8342000
unkown
page readonly
2686000
trusted library allocation
page read and write
11AD000
heap
page read and write
F44000
heap
page read and write
17D0000
heap
page read and write
E0B000
heap
page read and write
D4A000
heap
page read and write
AA6000
heap
page read and write
AC5000
heap
page read and write
D85000
heap
page read and write
1E9000
heap
page read and write
E0B000
heap
page read and write
DBC000
heap
page read and write
15EE000
heap
page read and write
2A1E000
heap
page read and write
D0C000
heap
page read and write
17D4000
heap
page read and write
D24000
heap
page read and write
DCB000
heap
page read and write
E0F000
heap
page read and write
1DA2000
heap
page read and write
14EE000
heap
page read and write
D0B000
heap
page read and write
F09000
heap
page read and write
DC3000
heap
page read and write
F1B000
heap
page read and write
DC3000
heap
page read and write
17E1000
heap
page read and write
118D000
heap
page read and write
CFB000
heap
page read and write
F3E000
heap
page read and write
D13000
heap
page read and write
BFD000
heap
page read and write
D4A000
heap
page read and write
1053000
heap
page read and write
1053000
heap
page read and write
CFB000
heap
page read and write
1048000
heap
page read and write
D85000
heap
page read and write
16EF000
heap
page read and write
C0D000
heap
page read and write
2A37000
heap
page read and write
DED000
heap
page read and write
DC3000
heap
page read and write
2C7D000
heap
page read and write
D07000
heap
page read and write
C24000
heap
page read and write
D69000
heap
page read and write
DB7000
heap
page read and write
F28000
heap
page read and write
C27000
heap
page read and write
1D87000
heap
page read and write
A3D000
heap
page read and write
430000
heap
page read and write
DC3000
heap
page read and write
27AA000
heap
page read and write
4D6F000
heap
page read and write
F3E000
heap
page read and write
17C6000
heap
page read and write
DBF000
heap
page read and write
D13000
heap
page read and write
17D4000
heap
page read and write
BF1000
heap
page read and write
169D000
heap
page read and write
17D0000
heap
page read and write
16BF000
heap
page read and write
2B5C000
heap
page read and write
17D0000
heap
page read and write
E0F000
heap
page read and write
C28000
heap
page read and write
1703000
heap
page read and write
DFC000
heap
page read and write
13D6000
heap
page read and write
1592000
heap
page read and write
C3B000
heap
page read and write
D41000
heap
page read and write
17D4000
heap
page read and write
2A38000
heap
page read and write
DED000
heap
page read and write
BFD000
heap
page read and write
1395000
heap
page read and write
D85000
heap
page read and write
17E1000
heap
page read and write
18BA000
heap
page read and write
F19000
heap
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
D17000
heap
page read and write
E0B000
heap
page read and write
1775000
heap
page read and write
A83000
heap
page read and write
D9F000
heap
page read and write
D0C000
heap
page read and write
D41000
heap
page read and write
16E5000
heap
page read and write
17E1000
heap
page read and write
C24000
heap
page read and write
DC5000
heap
page read and write
C3B000
heap
page read and write
BF1000
heap
page read and write
17E1000
heap
page read and write
CFB000
heap
page read and write
14D7000
heap
page read and write
2686000
trusted library allocation
page read and write
7FF6D8342000
unkown
page readonly
D24000
heap
page read and write
1053000
heap
page read and write
1053000
heap
page read and write
29EC000
heap
page read and write
DFC000
heap
page read and write
BFE000
heap
page read and write
CF7000
heap
page read and write
F18000
heap
page read and write
ABD000
heap
page read and write
D2A000
heap
page read and write
5E8D000
heap
page read and write
AE1000
heap
page read and write
C3B000
heap
page read and write
E0B000
heap
page read and write
16A0000
heap
page read and write
E0F000
heap
page read and write
D69000
heap
page read and write
F09000
heap
page read and write
16A0000
heap
page read and write
17E1000
heap
page read and write
17D4000
heap
page read and write
17C3000
heap
page read and write
77C000
stack
page read and write
2A2A000
heap
page read and write
1703000
heap
page read and write
17C3000
heap
page read and write
1048000
heap
page read and write
17E1000
heap
page read and write
17D4000
heap
page read and write
F28000
heap
page read and write
BF1000
heap
page read and write
DA0000
heap
page read and write
17E1000
heap
page read and write
BF1000
heap
page read and write
17DC000
heap
page read and write
17E1000
heap
page read and write
F09000
heap
page read and write
D2B000
heap
page read and write
AD9000
heap
page read and write
CF8000
heap
page read and write
160F000
stack
page read and write
E0B000
heap
page read and write
CE8000
heap
page read and write
1399000
heap
page read and write
BCF000
heap
page read and write
BDD000
heap
page read and write
17DC000
heap
page read and write
938000
heap
page read and write
7FF6D8321000
unkown
page execute read
D69000
heap
page read and write
157E000
heap
page read and write
1470000
heap
page read and write
AD9000
heap
page read and write
AD9000
heap
page read and write
2A33000
heap
page read and write
BF5000
heap
page read and write
17C0000
heap
page read and write
BCF000
heap
page read and write
D24000
heap
page read and write
DAF000
heap
page read and write
BF1000
heap
page read and write
C16000
heap
page read and write
C0D000
heap
page read and write
BE2000
heap
page read and write
DBC000
heap
page read and write
11BC000
heap
page read and write
F3E000
heap
page read and write
17C0000
heap
page read and write
17D4000
heap
page read and write
D13000
heap
page read and write
3162000
heap
page read and write
17D0000
heap
page read and write
DD1000
heap
page read and write
AC5000
heap
page read and write
DD1000
heap
page read and write
C3B000
heap
page read and write
17E1000
heap
page read and write
17C0000
heap
page read and write
F45000
heap
page read and write
66640000
unkown
page readonly
C28000
heap
page read and write
D69000
heap
page read and write
D0C000
heap
page read and write
DB7000
heap
page read and write
E0B000
heap
page read and write
D24000
heap
page read and write
DD8000
heap
page read and write
9C0000
heap
page read and write
C01000
heap
page read and write
F34000
heap
page read and write
BF1000
heap
page read and write
BD9000
heap
page read and write
DA8000
heap
page read and write
17DC000
heap
page read and write
17E1000
heap
page read and write
14D7000
heap
page read and write
DFC000
heap
page read and write
CF8000
heap
page read and write
1035000
heap
page read and write
D13000
heap
page read and write
D17000
heap
page read and write
17D4000
heap
page read and write
C48000
heap
page read and write
C30000
heap
page read and write
C05000
heap
page read and write
17C3000
heap
page read and write
D0C000
heap
page read and write
F3C000
heap
page read and write
2A3F000
heap
page read and write
DC3000
heap
page read and write
E0F000
heap
page read and write
17B0000
heap
page read and write
AD9000
heap
page read and write
7FF6D8350000
unkown
page write copy
E0F000
heap
page read and write
D0C000
heap
page read and write
C24000
heap
page read and write
D85000
heap
page read and write
17D4000
heap
page read and write
DED000
heap
page read and write
AD9000
heap
page read and write
17D4000
heap
page read and write
C49000
heap
page read and write
DEC000
heap
page read and write
DFC000
heap
page read and write
D69000
heap
page read and write
C24000
heap
page read and write
17D0000
heap
page read and write
DB7000
heap
page read and write
17B0000
heap
page read and write
54B5000
heap
page read and write
DFC000
heap
page read and write
11BA000
heap
page read and write
CF7000
heap
page read and write
F44000
heap
page read and write
2A37000
heap
page read and write
BE2000
heap
page read and write
1598000
heap
page read and write
166D000
heap
page read and write
11A2000
heap
page read and write
E0F000
heap
page read and write
F2C000
heap
page read and write
D4A000
heap
page read and write
16A0000
heap
page read and write
C3B000
heap
page read and write
17B0000
heap
page read and write
1321000
heap
page read and write
DB7000
heap
page read and write
11DF000
heap
page read and write
DEC000
heap
page read and write
A82000
heap
page read and write
C24000
heap
page read and write
1502000
heap
page read and write
17C0000
heap
page read and write
CE8000
heap
page read and write
D69000
heap
page read and write
AAE000
heap
page read and write
96B000
heap
page read and write
CEC000
heap
page read and write
29FC000
heap
page read and write
16BF000
heap
page read and write
1048000
heap
page read and write
D13000
heap
page read and write
17E1000
heap
page read and write
C2C000
heap
page read and write
1358000
heap
page read and write
1368000
heap
page read and write
4CA5000
heap
page read and write
1BA0000
heap
page read and write
1425000
heap
page read and write
1048000
heap
page read and write
2A3F000
heap
page read and write
1053000
heap
page read and write
D69000
heap
page read and write
BD3000
heap
page read and write
12F9000
heap
page read and write
DFC000
heap
page read and write
17C3000
heap
page read and write
16A0000
heap
page read and write
F18000
heap
page read and write
C16000
heap
page read and write
F34000
heap
page read and write
17D0000
heap
page read and write
BB4000
heap
page read and write
2C7D000
heap
page read and write
11A1000
heap
page read and write
17D0000
heap
page read and write
CE8000
heap
page read and write
17D0000
heap
page read and write
BE2000
heap
page read and write
D85000
heap
page read and write
14D7000
heap
page read and write
1586000
heap
page read and write
2A37000
heap
page read and write
1703000
heap
page read and write
16E5000
heap
page read and write
11A6000
heap
page read and write
C27000
heap
page read and write
1425000
heap
page read and write
A93000
heap
page read and write
DFC000
heap
page read and write
17C6000
heap
page read and write
D90000
heap
page read and write
DBB000
heap
page read and write
17DC000
heap
page read and write
17DC000
heap
page read and write
C3B000
heap
page read and write
E0F000
heap
page read and write
17D4000
heap
page read and write
DC3000
heap
page read and write
17D0000
heap
page read and write
17C0000
heap
page read and write
BE1000
heap
page read and write
DA8000
heap
page read and write
F1D000
heap
page read and write
BF7000
heap
page read and write
2A34000
heap
page read and write
D0C000
heap
page read and write
11B6000
heap
page read and write
9B5000
heap
page read and write
14EE000
heap
page read and write
17C6000
heap
page read and write
CE8000
heap
page read and write
DFC000
heap
page read and write
17D0000
heap
page read and write
C16000
heap
page read and write
4484000
heap
page read and write
F46000
heap
page read and write
17C0000
heap
page read and write
5F0C000
heap
page read and write
119D000
heap
page read and write
C1E000
heap
page read and write
16BF000
heap
page read and write
C0D000
heap
page read and write
16CF000
heap
page read and write
118E000
heap
page read and write
17E1000
heap
page read and write
16A0000
heap
page read and write
C3B000
heap
page read and write
29FC000
heap
page read and write
7FF6D8342000
unkown
page readonly
D0C000
heap
page read and write
DEC000
heap
page read and write
2A38000
heap
page read and write
BF1000
heap
page read and write
17C0000
heap
page read and write
DA8000
heap
page read and write
17E1000
heap
page read and write
C24000
heap
page read and write
F1B000
heap
page read and write
1703000
heap
page read and write
CF7000
heap
page read and write
1305000
heap
page read and write
F2C000
heap
page read and write
169D000
heap
page read and write
D69000
heap
page read and write
17B0000
heap
page read and write
CE8000
heap
page read and write
2B31000
heap
page read and write
AC5000
heap
page read and write
D69000
heap
page read and write
17E1000
heap
page read and write
17C6000
heap
page read and write
D69000
heap
page read and write
BF1000
heap
page read and write
E0B000
heap
page read and write
1048000
heap
page read and write
F3E000
heap
page read and write
F3E000
heap
page read and write
CFB000
heap
page read and write
C16000
heap
page read and write
1703000
heap
page read and write
D90000
heap
page read and write
DD8000
heap
page read and write
D03000
heap
page read and write
DD8000
heap
page read and write
D69000
heap
page read and write
E0B000
heap
page read and write
127D000
heap
page read and write
17E1000
heap
page read and write
1048000
heap
page read and write
BE2000
heap
page read and write
1632000
heap
page read and write
D06000
heap
page read and write
C0F000
stack
page read and write
CFB000
heap
page read and write
958000
heap
page read and write
F34000
heap
page read and write
17D0000
heap
page read and write
1270000
heap
page read and write
BF1000
heap
page read and write
1231000
heap
page read and write
118E000
heap
page read and write
EDB000
heap
page read and write
DD8000
heap
page read and write
C24000
heap
page read and write
D45000
heap
page read and write
F46000
heap
page read and write
DFC000
heap
page read and write
26E3000
heap
page read and write
17B0000
heap
page read and write
ABD000
heap
page read and write
2A10000
heap
page read and write
D0C000
heap
page read and write
17B0000
heap
page read and write
DC3000
heap
page read and write
2A3A000
heap
page read and write
BF2000
heap
page read and write
AE3000
heap
page read and write
D10000
heap
page read and write
E0B000
heap
page read and write
17C3000
heap
page read and write
ABD000
heap
page read and write
DD8000
heap
page read and write
666D1000
unkown
page readonly
11AD000
heap
page read and write
D10000
heap
page read and write
17DC000
heap
page read and write
5E70000
heap
page read and write
A92000
heap
page read and write
F1D000
heap
page read and write
C01000
heap
page read and write
BF4000
heap
page read and write
AC5000
heap
page read and write
DB7000
heap
page read and write
4D90000
heap
page read and write
F28000
heap
page read and write
17DC000
heap
page read and write
F3E000
heap
page read and write
DFC000
heap
page read and write
17B0000
heap
page read and write
C16000
heap
page read and write
7FF6D834F000
unkown
page readonly
24C6000
trusted library allocation
page read and write
BF1000
heap
page read and write
17E1000
heap
page read and write
A93000
heap
page read and write
E0B000
heap
page read and write
F3E000
heap
page read and write
C01000
heap
page read and write
17C6000
heap
page read and write
DA7000
heap
page read and write
CF8000
heap
page read and write
BB4000
heap
page read and write
5E78000
heap
page read and write
CF7000
heap
page read and write
4481000
heap
page read and write
B41000
heap
page read and write
B6C000
heap
page read and write
DC3000
heap
page read and write
DC4000
heap
page read and write
DB0000
heap
page read and write
BF1000
heap
page read and write
17C3000
heap
page read and write
17E1000
heap
page read and write
CF7000
heap
page read and write
D24000
heap
page read and write
DD8000
heap
page read and write
2C6C000
heap
page read and write
17E1000
heap
page read and write
C48000
heap
page read and write
29FF000
heap
page read and write
1338000
heap
page read and write
306E000
heap
page read and write
DD1000
heap
page read and write
2A37000
heap
page read and write
D07000
heap
page read and write
17DC000
heap
page read and write
DEC000
heap
page read and write
16A0000
heap
page read and write
17D4000
heap
page read and write
BF1000
heap
page read and write
D9F000
heap
page read and write
E0B000
heap
page read and write
1412000
heap
page read and write
F2C000
heap
page read and write
17E1000
heap
page read and write
A83000
heap
page read and write
17C6000
heap
page read and write
C28000
heap
page read and write
CF7000
heap
page read and write
D13000
heap
page read and write
666D1000
unkown
page readonly
17C0000
heap
page read and write
E0F000
heap
page read and write
14E8000
heap
page read and write
14D7000
heap
page read and write
DB7000
heap
page read and write
DA8000
heap
page read and write
5EBC000
heap
page read and write
DD8000
heap
page read and write
26CF000
trusted library allocation
page read and write
11BC000
heap
page read and write
17D4000
heap
page read and write
17E1000
heap
page read and write
E0B000
heap
page read and write
DA8000
heap
page read and write
E0B000
heap
page read and write
17D0000
heap
page read and write
7FF6D8320000
unkown
page readonly
CF8000
heap
page read and write
F3E000
heap
page read and write
D69000
heap
page read and write
BCF000
heap
page read and write
BCF000
heap
page read and write
DED000
heap
page read and write
7FF6D8320000
unkown
page readonly
1663000
heap
page read and write
17B0000
heap
page read and write
F27000
heap
page read and write
DA8000
heap
page read and write
DEC000
heap
page read and write
DFC000
heap
page read and write
11B6000
heap
page read and write
AC5000
heap
page read and write
17E1000
heap
page read and write
169D000
heap
page read and write
CE8000
heap
page read and write
DD8000
heap
page read and write
AAE000
heap
page read and write
D24000
heap
page read and write
DFC000
heap
page read and write
DEC000
heap
page read and write
C2A000
heap
page read and write
4DD2000
heap
page read and write
1053000
heap
page read and write
2A37000
heap
page read and write
C40000
heap
page read and write
7FF6D8350000
unkown
page write copy
4F61000
heap
page read and write
2A30000
heap
page read and write
BF1000
heap
page read and write
1586000
heap
page read and write
116A000
heap
page read and write
C24000
heap
page read and write
2A22000
heap
page read and write
E0B000
heap
page read and write
ABD000
heap
page read and write
AAE000
heap
page read and write
F28000
heap
page read and write
DEC000
heap
page read and write
F34000
heap
page read and write
2A0E000
heap
page read and write
DA8000
heap
page read and write
E0B000
heap
page read and write
D69000
heap
page read and write
D0C000
heap
page read and write
E0F000
heap
page read and write
D0B000
heap
page read and write
890000
heap
page read and write
2D10000
heap
page read and write
66641000
unkown
page execute read
DEC000
heap
page read and write
AD1000
heap
page read and write
DAD000
heap
page read and write
17B0000
heap
page read and write
17C6000
heap
page read and write
DCB000
heap
page read and write
BF5000
heap
page read and write
13D2000
heap
page read and write
17CB000
heap
page read and write
17B0000
heap
page read and write
C15000
heap
page read and write
BF1000
heap
page read and write
D3D000
heap
page read and write
D0C000
heap
page read and write
D90000
heap
page read and write
D6F000
heap
page read and write
2A3F000
heap
page read and write
DEC000
heap
page read and write
F28000
heap
page read and write
C3B000
heap
page read and write
F46000
heap
page read and write
DA8000
heap
page read and write
2A22000
heap
page read and write
C3B000
heap
page read and write
DEC000
heap
page read and write
14D7000
heap
page read and write
17E1000
heap
page read and write
F18000
heap
page read and write
4D8F000
heap
page read and write
17E1000
heap
page read and write
F46000
heap
page read and write
17C6000
heap
page read and write
1048000
heap
page read and write
1B95000
heap
page read and write
F3E000
heap
page read and write
C3B000
heap
page read and write
DD8000
heap
page read and write
29FF000
heap
page read and write
ABD000
heap
page read and write
E0B000
heap
page read and write
DA8000
heap
page read and write
DC3000
heap
page read and write
14D7000
heap
page read and write
BE2000
heap
page read and write
C16000
heap
page read and write
11BC000
heap
page read and write
1048000
heap
page read and write
CEC000
heap
page read and write
F2C000
heap
page read and write
16A0000
heap
page read and write
AD9000
heap
page read and write
11DF000
heap
page read and write
DED000
heap
page read and write
CD1000
heap
page read and write
CF7000
heap
page read and write
2C7C000
heap
page read and write
F46000
heap
page read and write
F46000
heap
page read and write
C16000
heap
page read and write
DB0000
heap
page read and write
DD8000
heap
page read and write
AD9000
heap
page read and write
17C0000
heap
page read and write
DA0000
heap
page read and write
4F5D000
heap
page read and write
F28000
heap
page read and write
26CF000
heap
page read and write
AD9000
heap
page read and write
11BC000
heap
page read and write
E0F000
heap
page read and write
16A0000
heap
page read and write
F3D000
heap
page read and write
1048000
heap
page read and write
1048000
heap
page read and write
AC0000
heap
page read and write
7FF6D8350000
unkown
page write copy
DDD000
heap
page read and write
F3E000
heap
page read and write
4CEF000
heap
page read and write
DEC000
heap
page read and write
DD8000
heap
page read and write
DC3000
heap
page read and write
83F000
stack
page read and write
2A2A000
heap
page read and write
D24000
heap
page read and write
7FF6D834D000
unkown
page write copy
2A3F000
heap
page read and write
D13000
heap
page read and write
2B16000
heap
page read and write
DFC000
heap
page read and write
11D3000
heap
page read and write
DBC000
heap
page read and write
7FF6D834F000
unkown
page readonly
2A3D000
heap
page read and write
17DC000
heap
page read and write
DEC000
heap
page read and write
DBC000
heap
page read and write
E0F000
heap
page read and write
2D10000
heap
page read and write
B11000
heap
page read and write
BD3000
heap
page read and write
1658000
heap
page read and write
26CF000
trusted library allocation
page read and write
F28000
heap
page read and write
AC5000
heap
page read and write
C0D000
heap
page read and write
2A37000
heap
page read and write
1347000
heap
page read and write
F28000
heap
page read and write
AD9000
heap
page read and write
F2C000
heap
page read and write
DFC000
heap
page read and write
17D0000
heap
page read and write
14EE000
heap
page read and write
17DC000
heap
page read and write
A80000
heap
page read and write
DD8000
heap
page read and write
D07000
heap
page read and write
666F4000
unkown
page write copy
E0B000
heap
page read and write
2CAD000
heap
page read and write
C2C000
heap
page read and write
D10000
heap
page read and write
2686000
trusted library allocation
page read and write
BBD000
heap
page read and write
11B6000
heap
page read and write
7FF6D8321000
unkown
page execute read
11BC000
heap
page read and write
17B0000
heap
page read and write
AD9000
heap
page read and write
2A0E000
heap
page read and write
1532000
heap
page read and write
29EE000
heap
page read and write
DEC000
heap
page read and write
17D0000
heap
page read and write
BD9000
heap
page read and write
1048000
heap
page read and write
17D0000
heap
page read and write
E0F000
heap
page read and write
666FA000
unkown
page readonly
17D0000
heap
page read and write
C05000
heap
page read and write
D1D000
heap
page read and write
2A22000
heap
page read and write
F1E000
heap
page read and write
C37000
heap
page read and write
DEC000
heap
page read and write
114C000
heap
page read and write
E0F000
heap
page read and write
D9F000
heap
page read and write
D07000
heap
page read and write
E0F000
heap
page read and write
17D0000
heap
page read and write
17D4000
heap
page read and write
DDD000
heap
page read and write
11AD000
heap
page read and write
F18000
heap
page read and write
3A0000
heap
page read and write
C14000
heap
page read and write
1048000
heap
page read and write
17D4000
heap
page read and write
DCB000
heap
page read and write
F28000
heap
page read and write
C68000
heap
page read and write
DBC000
heap
page read and write
D8F000
heap
page read and write
E0F000
heap
page read and write
1121000
heap
page read and write
F18000
heap
page read and write
66641000
unkown
page execute read
17E1000
heap
page read and write
11B6000
heap
page read and write
17C3000
heap
page read and write
16CF000
heap
page read and write
26CF000
trusted library allocation
page read and write
BE2000
heap
page read and write
11BA000
heap
page read and write
11BA000
heap
page read and write
17DC000
heap
page read and write
17C0000
heap
page read and write
C24000
heap
page read and write
DEC000
heap
page read and write
DD1000
heap
page read and write
17C0000
heap
page read and write
17B0000
heap
page read and write
DC3000
heap
page read and write
DC3000
heap
page read and write
DAD000
heap
page read and write
17C3000
heap
page read and write
DD8000
heap
page read and write
17C3000
heap
page read and write
2A3F000
heap
page read and write
207A000
heap
page read and write
666FA000
unkown
page readonly
11BC000
heap
page read and write
B9B000
heap
page read and write
2A73000
heap
page read and write
DBC000
heap
page read and write
16CF000
heap
page read and write
D24000
heap
page read and write
7FF6D8351000
unkown
page readonly
16BF000
heap
page read and write
DDD000
heap
page read and write
17E1000
heap
page read and write
16CF000
heap
page read and write
AA2000
heap
page read and write
F3C000
heap
page read and write
17DC000
heap
page read and write
DBC000
heap
page read and write
17C0000
heap
page read and write
DEC000
heap
page read and write
E0B000
heap
page read and write
F46000
heap
page read and write
DEC000
heap
page read and write
C24000
heap
page read and write
2A08000
heap
page read and write
66706000
unkown
page readonly
16AE000
heap
page read and write
C05000
heap
page read and write
DC3000
heap
page read and write
250F000
trusted library allocation
page read and write
16A1000
heap
page read and write
2A2A000
heap
page read and write
D85000
heap
page read and write
DC4000
heap
page read and write
C0D000
heap
page read and write
11AD000
heap
page read and write
D65000
heap
page read and write
C58000
heap
page read and write
17DC000
heap
page read and write
11BC000
heap
page read and write
AD9000
heap
page read and write
DFC000
heap
page read and write
CFC000
heap
page read and write
CF7000
heap
page read and write
D57000
heap
page read and write
119E000
heap
page read and write
C24000
heap
page read and write
1425000
heap
page read and write
165D000
heap
page read and write
4296000
heap
page read and write
F28000
heap
page read and write
DD1000
heap
page read and write
17D0000
heap
page read and write
17DC000
heap
page read and write
186F000
heap
page read and write
BE2000
heap
page read and write
C16000
heap
page read and write
66640000
unkown
page readonly
11AD000
heap
page read and write
11B6000
heap
page read and write
17C3000
heap
page read and write
11BC000
heap
page read and write
16A0000
heap
page read and write
C0D000
heap
page read and write
F28000
heap
page read and write
ABD000
heap
page read and write
17B0000
heap
page read and write
AA2000
heap
page read and write
DB7000
heap
page read and write
1308000
heap
page read and write
D79000
heap
page read and write
29EC000
heap
page read and write
E0F000
heap
page read and write
17C0000
heap
page read and write
DEC000
heap
page read and write
C16000
heap
page read and write
D52000
heap
page read and write
BC8000
heap
page read and write
17C6000
heap
page read and write
CFC000
heap
page read and write
F23000
heap
page read and write
D0C000
heap
page read and write
1053000
heap
page read and write
DC3000
heap
page read and write
DEC000
heap
page read and write
BF1000
heap
page read and write
16E5000
heap
page read and write
11C4000
heap
page read and write
BE2000
heap
page read and write
D24000
heap
page read and write
29EC000
heap
page read and write
17C3000
heap
page read and write
F44000
heap
page read and write
1048000
heap
page read and write
AA2000
heap
page read and write
5F2D000
heap
page read and write
DA8000
heap
page read and write
17E1000
heap
page read and write
A92000
heap
page read and write
17C0000
heap
page read and write
AD9000
heap
page read and write
E0F000
heap
page read and write
D85000
heap
page read and write
17E1000
heap
page read and write
11B3000
heap
page read and write
F46000
heap
page read and write
5336000
heap
page read and write
1573000
heap
page read and write
BD3000
heap
page read and write
16A0000
heap
page read and write
D1D000
heap
page read and write
C24000
heap
page read and write
DD8000
heap
page read and write
AD9000
heap
page read and write
17B0000
heap
page read and write
17DC000
heap
page read and write
DD8000
heap
page read and write
C96000
heap
page read and write
F28000
heap
page read and write
D85000
heap
page read and write
C16000
heap
page read and write
C3B000
heap
page read and write
17E1000
heap
page read and write
140D000
heap
page read and write
5466000
heap
page read and write
C16000
heap
page read and write
BEC000
heap
page read and write
D03000
heap
page read and write
ADD000
heap
page read and write
2686000
trusted library allocation
page read and write
7FF6D834F000
unkown
page readonly
D1D000
heap
page read and write
BEC000
heap
page read and write
AE3000
heap
page read and write
29FC000
heap
page read and write
DC3000
heap
page read and write
17E1000
heap
page read and write
C0D000
heap
page read and write
1E5000
heap
page read and write
AA2000
heap
page read and write
DAF000
heap
page read and write
DEC000
heap
page read and write
2C81000
heap
page read and write
17C5000
heap
page read and write
C32000
heap
page read and write
17DC000
heap
page read and write
CE8000
heap
page read and write
A7C000
heap
page read and write
CE8000
heap
page read and write
DFC000
heap
page read and write
D0B000
heap
page read and write
DC3000
heap
page read and write
AAE000
heap
page read and write
F2C000
heap
page read and write
7FF6D8321000
unkown
page execute read
119E000
heap
page read and write
AA6000
heap
page read and write
666FA000
unkown
page readonly
C24000
heap
page read and write
DFC000
heap
page read and write
BF9000
heap
page read and write
16EA000
heap
page read and write
17D0000
heap
page read and write
17E1000
heap
page read and write
16BB000
heap
page read and write
D0B000
heap
page read and write
17E1000
heap
page read and write
BE2000
heap
page read and write
DC4000
heap
page read and write
7FF6D834D000
unkown
page write copy
1048000
heap
page read and write
16E5000
heap
page read and write
17B0000
heap
page read and write
2B50000
heap
page read and write
C24000
heap
page read and write
11B6000
heap
page read and write
DB0000
heap
page read and write
CE8000
heap
page read and write
2C81000
heap
page read and write
17D0000
heap
page read and write
126F000
stack
page read and write
7FF6D8351000
unkown
page readonly
7FF6D834D000
unkown
page read and write
5E4F000
heap
page read and write
2CDF000
heap
page read and write
BFD000
heap
page read and write
C16000
heap
page read and write
DBC000
heap
page read and write
11BC000
heap
page read and write
17C3000
heap
page read and write
2680000
trusted library allocation
page read and write
1655000
heap
page read and write
D0C000
heap
page read and write
F1B000
heap
page read and write
4C64000
heap
page read and write
1048000
heap
page read and write
ED8000
heap
page read and write
17C0000
heap
page read and write
C3B000
heap
page read and write
C32000
heap
page read and write
C16000
heap
page read and write
17C3000
heap
page read and write
AE3000
heap
page read and write
11AF000
heap
page read and write
C01000
heap
page read and write
BB4000
heap
page read and write
1703000
heap
page read and write
12FC000
stack
page read and write
BE2000
heap
page read and write
16BF000
heap
page read and write
BF1000
heap
page read and write
D24000
heap
page read and write
13E1000
heap
page read and write
A92000
heap
page read and write
BF1000
heap
page read and write
DAF000
heap
page read and write
2A1E000
heap
page read and write
F3D000
heap
page read and write
414000
unkown
page readonly
F34000
heap
page read and write
DC3000
heap
page read and write
C16000
heap
page read and write
DBC000
heap
page read and write
17E1000
heap
page read and write
BC8000
heap
page read and write
DC3000
heap
page read and write
DAB000
heap
page read and write
29D9000
heap
page read and write
DC3000
heap
page read and write
F3E000
heap
page read and write
17E1000
heap
page read and write
16A0000
heap
page read and write
F1E000
heap
page read and write
F09000
heap
page read and write
C16000
heap
page read and write
C05000
heap
page read and write
17E1000
heap
page read and write
F34000
heap
page read and write
17C3000
heap
page read and write
17C0000
heap
page read and write
17D0000
heap
page read and write
16A1000
heap
page read and write
17CB000
heap
page read and write
17B0000
heap
page read and write
17C3000
heap
page read and write
DEC000
heap
page read and write
C3B000
heap
page read and write
7FF6D834F000
unkown
page readonly
17C0000
heap
page read and write
ABD000
heap
page read and write
F46000
heap
page read and write
17D4000
heap
page read and write
17C3000
heap
page read and write
D24000
heap
page read and write
13E2000
heap
page read and write
17C6000
heap
page read and write
17DC000
heap
page read and write
17E1000
heap
page read and write
2A22000
heap
page read and write
F28000
heap
page read and write
C48000
heap
page read and write
DB0000
heap
page read and write
139E000
heap
page read and write
1703000
heap
page read and write
F46000
heap
page read and write
17C0000
heap
page read and write
E0F000
heap
page read and write
17C3000
heap
page read and write
14C2000
heap
page read and write
11B6000
heap
page read and write
C28000
heap
page read and write
F22000
heap
page read and write
17C0000
heap
page read and write
17DC000
heap
page read and write
D13000
heap
page read and write
C3B000
heap
page read and write
119D000
heap
page read and write
CE8000
heap
page read and write
16A0000
heap
page read and write
7FF6D8351000
unkown
page readonly
CE8000
heap
page read and write
BF1000
heap
page read and write
5E45000
heap
page read and write
17E1000
heap
page read and write
D6A000
heap
page read and write
17C3000
heap
page read and write
CE8000
heap
page read and write
AD9000
heap
page read and write
DBC000
heap
page read and write
DAF000
heap
page read and write
C0D000
heap
page read and write
DBB000
heap
page read and write
EFD000
heap
page read and write
BE6000
heap
page read and write
4DA2000
heap
page read and write
5F30000
heap
page read and write
BC8000
heap
page read and write
17DC000
heap
page read and write
F3E000
heap
page read and write
F34000
heap
page read and write
BFD000
heap
page read and write
F46000
heap
page read and write
1703000
heap
page read and write
C3C000
heap
page read and write
17DC000
heap
page read and write
17E1000
heap
page read and write
16A0000
heap
page read and write
1053000
heap
page read and write
F46000
heap
page read and write
E0B000
heap
page read and write
C15000
heap
page read and write
D50000
heap
page read and write
ABD000
heap
page read and write
D24000
heap
page read and write
17C5000
heap
page read and write
17DC000
heap
page read and write
16A1000
heap
page read and write
1181000
heap
page read and write
378B000
heap
page read and write
CE8000
heap
page read and write
DFC000
heap
page read and write
17D0000
heap
page read and write
7FF6D834D000
unkown
page write copy
D90000
heap
page read and write
17E1000
heap
page read and write
DB0000
heap
page read and write
CFE000
heap
page read and write
1172000
heap
page read and write
D2A000
heap
page read and write
E0B000
heap
page read and write
C28000
heap
page read and write
17C3000
heap
page read and write
7FF6D8320000
unkown
page readonly
17C0000
heap
page read and write
17C5000
heap
page read and write
E0F000
heap
page read and write
DED000
heap
page read and write
D49000
heap
page read and write
D34000
heap
page read and write
D85000
heap
page read and write
ABD000
heap
page read and write
DA8000
heap
page read and write
C0D000
heap
page read and write
1044000
heap
page read and write
17DC000
heap
page read and write
C68000
heap
page read and write
DB7000
heap
page read and write
F2C000
heap
page read and write
AC7000
heap
page read and write
1172000
heap
page read and write
DFC000
heap
page read and write
C28000
heap
page read and write
F44000
heap
page read and write
2BC8000
heap
page read and write
F34000
heap
page read and write
16A0000
heap
page read and write
F09000
heap
page read and write
BE2000
heap
page read and write
AC5000
heap
page read and write
F34000
heap
page read and write
E0B000
heap
page read and write
F3E000
heap
page read and write
17B0000
heap
page read and write
D76000
heap
page read and write
16A0000
heap
page read and write
F34000
heap
page read and write
177E000
heap
page read and write
14F0000
heap
page read and write
29FC000
heap
page read and write
AD9000
heap
page read and write
DC3000
heap
page read and write
1048000
heap
page read and write
41D000
unkown
page readonly
17C3000
heap
page read and write
2A3F000
heap
page read and write
F2C000
heap
page read and write
2A3F000
heap
page read and write
4B0000
heap
page read and write
D10000
heap
page read and write
F46000
heap
page read and write
169C000
heap
page read and write
17B0000
heap
page read and write
F23000
heap
page read and write
DB7000
heap
page read and write
F04000
heap
page read and write
17DC000
heap
page read and write
DFC000
heap
page read and write
2A3A000
heap
page read and write
CF8000
heap
page read and write
666FA000
unkown
page readonly
A83000
heap
page read and write
17C3000
heap
page read and write
17E1000
heap
page read and write
C3B000
heap
page read and write
D07000
heap
page read and write
D17000
heap
page read and write
DFC000
heap
page read and write
D85000
heap
page read and write
13E1000
heap
page read and write
17DC000
heap
page read and write
7FF6D8320000
unkown
page readonly
AC5000
heap
page read and write
C24000
heap
page read and write
1592000
heap
page read and write
DEC000
heap
page read and write
DD8000
heap
page read and write
17E1000
heap
page read and write
AAE000
heap
page read and write
F09000
heap
page read and write
17DC000
heap
page read and write
2A0E000
heap
page read and write
16EF000
heap
page read and write
F34000
heap
page read and write
D7B000
heap
page read and write
D24000
heap
page read and write
CE8000
heap
page read and write
C28000
heap
page read and write
DA8000
heap
page read and write
1031000
heap
page read and write
D85000
heap
page read and write
16EF000
heap
page read and write
F18000
heap
page read and write
DD8000
heap
page read and write
29FC000
heap
page read and write
D69000
heap
page read and write
17C0000
heap
page read and write
1048000
heap
page read and write
C2C000
heap
page read and write
1425000
heap
page read and write
1164000
heap
page read and write
DD8000
heap
page read and write
EF1000
heap
page read and write
17D0000
heap
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
F2C000
heap
page read and write
D1D000
heap
page read and write
A91000
heap
page read and write
A93000
heap
page read and write
D85000
heap
page read and write
17B0000
heap
page read and write
158C000
heap
page read and write
17E1000
heap
page read and write
C3B000
heap
page read and write
DEC000
heap
page read and write
DFC000
heap
page read and write
17C6000
heap
page read and write
17D4000
heap
page read and write
D3D000
heap
page read and write
D13000
heap
page read and write
C48000
heap
page read and write
D40000
heap
page read and write
C05000
heap
page read and write
17E1000
heap
page read and write
1387000
heap
page read and write
F34000
heap
page read and write
C24000
heap
page read and write
7FF6D8350000
unkown
page read and write
BFD000
heap
page read and write
D0C000
heap
page read and write
F46000
heap
page read and write
11DE000
heap
page read and write
C01000
heap
page read and write
F18000
heap
page read and write
26CF000
trusted library allocation
page read and write
BE2000
heap
page read and write
BF5000
heap
page read and write
17C0000
heap
page read and write
17E1000
heap
page read and write
BE2000
heap
page read and write
BCD000
heap
page read and write
4F41000
heap
page read and write
17D0000
heap
page read and write
17D0000
heap
page read and write
D13000
heap
page read and write
1770000
heap
page read and write
17CB000
heap
page read and write
CDC000
heap
page read and write
C05000
heap
page read and write
17D4000
heap
page read and write
1031000
heap
page read and write
AC5000
heap
page read and write
DBC000
heap
page read and write
F44000
heap
page read and write
DD8000
heap
page read and write
17C6000
heap
page read and write
2A1E000
heap
page read and write
C2C000
heap
page read and write
7FF6D834D000
unkown
page write copy
C3B000
heap
page read and write
11A7000
heap
page read and write
2A3F000
heap
page read and write
D76000
heap
page read and write
17B0000
heap
page read and write
DD8000
heap
page read and write
BFD000
heap
page read and write
2A30000
heap
page read and write
C24000
heap
page read and write
C68000
heap
page read and write
17D0000
heap
page read and write
17B0000
heap
page read and write
17DC000
heap
page read and write
C30000
heap
page read and write
F44000
heap
page read and write
DD1000
heap
page read and write
2847000
heap
page read and write
AA2000
heap
page read and write
2A30000
heap
page read and write
F19000
heap
page read and write
AC5000
heap
page read and write
578000
heap
page read and write
17D0000
heap
page read and write
F46000
heap
page read and write
17C1000
heap
page read and write
CF8000
heap
page read and write
DFC000
heap
page read and write
2A18000
heap
page read and write
F3D000
heap
page read and write
C05000
heap
page read and write
1035000
heap
page read and write
17C0000
heap
page read and write
CD1000
heap
page read and write
D4A000
heap
page read and write
1425000
heap
page read and write
17A1000
heap
page read and write
DBF000
heap
page read and write
D0B000
heap
page read and write
C16000
heap
page read and write
7FF6D8351000
unkown
page readonly
1053000
heap
page read and write
16A1000
heap
page read and write
A97000
heap
page read and write
F28000
heap
page read and write
DB7000
heap
page read and write
17DC000
heap
page read and write
2A3F000
heap
page read and write
17E1000
heap
page read and write
17B0000
heap
page read and write
ABD000
heap
page read and write
DA8000
heap
page read and write
C85000
heap
page read and write
666FA000
unkown
page readonly
DC3000
heap
page read and write
D10000
heap
page read and write
17D4000
heap
page read and write
F1D000
heap
page read and write
F46000
heap
page read and write
C3B000
heap
page read and write
2A17000
heap
page read and write
16A1000
heap
page read and write
C0D000
heap
page read and write
DD1000
heap
page read and write
17D0000
heap
page read and write
F44000
heap
page read and write
D07000
heap
page read and write
DC3000
heap
page read and write
F46000
heap
page read and write
16CF000
heap
page read and write
1048000
heap
page read and write
17C6000
heap
page read and write
17E1000
heap
page read and write
C08000
heap
page read and write
2A33000
heap
page read and write
C3B000
heap
page read and write
17E1000
heap
page read and write
F28000
heap
page read and write
C16000
heap
page read and write
D85000
heap
page read and write
C48000
heap
page read and write
14D3000
heap
page read and write
D24000
heap
page read and write
F38000
heap
page read and write
E0F000
heap
page read and write
C01000
heap
page read and write
16A0000
heap
page read and write
D85000
heap
page read and write
A9A000
heap
page read and write
1048000
heap
page read and write
ABD000
heap
page read and write
CFB000
heap
page read and write
1B1F000
heap
page read and write
DCB000
heap
page read and write
D18000
heap
page read and write
2C7D000
heap
page read and write
D13000
heap
page read and write
A83000
heap
page read and write
7FF6D8321000
unkown
page execute read
1185000
heap
page read and write
D51000
heap
page read and write
DC4000
heap
page read and write
7FF6D8321000
unkown
page execute read
F3E000
heap
page read and write
D3D000
heap
page read and write
C3C000
heap
page read and write
C0D000
heap
page read and write
2A3F000
heap
page read and write
DB7000
heap
page read and write
ABD000
heap
page read and write
1048000
heap
page read and write
1394000
heap
page read and write
BF5000
heap
page read and write
16A1000
heap
page read and write
17E1000
heap
page read and write
ABD000
heap
page read and write
BCF000
heap
page read and write
17E1000
heap
page read and write
CEC000
heap
page read and write
DBC000
heap
page read and write
D0C000
heap
page read and write
2A22000
heap
page read and write
17E1000
heap
page read and write
16E5000
heap
page read and write
D06000
heap
page read and write
17D4000
heap
page read and write
A97000
heap
page read and write
1048000
heap
page read and write
D07000
heap
page read and write
16CF000
heap
page read and write
DA0000
heap
page read and write
F34000
heap
page read and write
AC5000
heap
page read and write
DD8000
heap
page read and write
17B0000
heap
page read and write
D69000
heap
page read and write
DC4000
heap
page read and write
DB7000
heap
page read and write
BE7000
heap
page read and write
E0B000
heap
page read and write
F09000
heap
page read and write
17D0000
heap
page read and write
17D4000
heap
page read and write
11B6000
heap
page read and write
ABD000
heap
page read and write
F46000
heap
page read and write
DA8000
heap
page read and write
D69000
heap
page read and write
AAE000
heap
page read and write
17C5000
heap
page read and write
1610000
heap
page read and write
16BF000
heap
page read and write
F44000
heap
page read and write
C24000
heap
page read and write
DC3000
heap
page read and write
E0F000
heap
page read and write
11AD000
heap
page read and write
17C6000
heap
page read and write
DCB000
heap
page read and write
ABD000
heap
page read and write
F46000
heap
page read and write
77F000
stack
page read and write
16E5000
heap
page read and write
EFE000
heap
page read and write
DFC000
heap
page read and write
D69000
heap
page read and write
DEC000
heap
page read and write
29FF000
heap
page read and write
17C6000
heap
page read and write
1030000
heap
page read and write
17C0000
heap
page read and write
17C6000
heap
page read and write
419000
unkown
page read and write
1048000
heap
page read and write
17E1000
heap
page read and write
17D0000
heap
page read and write
DAB000
heap
page read and write
16B3000
heap
page read and write
4F8E000
heap
page read and write
17E1000
heap
page read and write
99E000
heap
page read and write
C00000
heap
page read and write
C24000
heap
page read and write
F34000
heap
page read and write
F18000
heap
page read and write
D13000
heap
page read and write
BCC000
heap
page read and write
17C6000
heap
page read and write
2CA1000
heap
page read and write
CF7000
heap
page read and write
F44000
heap
page read and write
D85000
heap
page read and write
F2C000
heap
page read and write
AC5000
heap
page read and write
DEC000
heap
page read and write
D24000
heap
page read and write
1642000
heap
page read and write
1164000
heap
page read and write
4D3F000
heap
page read and write
17E1000
heap
page read and write
17B0000
heap
page read and write
1048000
heap
page read and write
5ECC000
heap
page read and write
BC8000
heap
page read and write
1184000
heap
page read and write
16A1000
heap
page read and write
D24000
heap
page read and write
17C0000
heap
page read and write
BFC000
heap
page read and write
DEC000
heap
page read and write
F19000
heap
page read and write
29FF000
heap
page read and write
14DD000
heap
page read and write
D0C000
heap
page read and write
1185000
heap
page read and write
14DD000
heap
page read and write
E0F000
heap
page read and write
AAE000
heap
page read and write
D24000
heap
page read and write
DBC000
heap
page read and write
DB8000
heap
page read and write
17C1000
heap
page read and write
2A3F000
heap
page read and write
F04000
heap
page read and write
DFC000
heap
page read and write
66702000
unkown
page execute
666FA000
unkown
page readonly
1048000
heap
page read and write
F3E000
heap
page read and write
17D4000
heap
page read and write
1642000
heap
page read and write
CE8000
heap
page read and write
1182000
heap
page read and write
CF8000
heap
page read and write
F19000
heap
page read and write
BFD000
heap
page read and write
17D0000
heap
page read and write
DBC000
heap
page read and write
118D000
heap
page read and write
F18000
heap
page read and write
CF6000
heap
page read and write
DD8000
heap
page read and write
D24000
heap
page read and write
F44000
heap
page read and write
26CF000
trusted library allocation
page read and write
DA8000
heap
page read and write
17D0000
heap
page read and write
2A38000
heap
page read and write
2A0E000
heap
page read and write
17D0000
heap
page read and write
2A34000
heap
page read and write
F18000
heap
page read and write
7FF6D834D000
unkown
page read and write
1662000
heap
page read and write
A93000
heap
page read and write
D13000
heap
page read and write
11DE000
heap
page read and write
E0F000
heap
page read and write
D13000
heap
page read and write
2C20000
heap
page read and write
DCB000
heap
page read and write
D24000
heap
page read and write
DA8000
heap
page read and write
17E1000
heap
page read and write
2A3F000
heap
page read and write
BFD000
heap
page read and write
F44000
heap
page read and write
A83000
heap
page read and write
C24000
heap
page read and write
CFB000
heap
page read and write
5E93000
heap
page read and write
C68000
heap
page read and write
1489000
heap
page read and write
17D4000
heap
page read and write
BE2000
heap
page read and write
C01000
heap
page read and write
2A3F000
heap
page read and write
14F5000
heap
page read and write
DB0000
heap
page read and write
D90000
heap
page read and write
F1B000
heap
page read and write
2530000
trusted library allocation
page read and write
D24000
heap
page read and write
17C1000
heap
page read and write
3792000
heap
page read and write
1185000
heap
page read and write
17DC000
heap
page read and write
D24000
heap
page read and write
1647000
heap
page read and write
16EF000
heap
page read and write
1181000
heap
page read and write
17E1000
heap
page read and write
16BF000
heap
page read and write
1425000
heap
page read and write
DD8000
heap
page read and write
D69000
heap
page read and write
D0D000
heap
page read and write
DAD000
heap
page read and write
17B0000
heap
page read and write
11BC000
heap
page read and write
D69000
heap
page read and write
F46000
heap
page read and write
2A22000
heap
page read and write
2A3F000
heap
page read and write
BBB000
heap
page read and write
F28000
heap
page read and write
DD8000
heap
page read and write
DEC000
heap
page read and write
7FF6D8320000
unkown
page readonly
17E1000
heap
page read and write
14B3000
heap
page read and write
E0F000
heap
page read and write
17C0000
heap
page read and write
4F5D000
heap
page read and write
A6F000
heap
page read and write
F28000
heap
page read and write
CF7000
heap
page read and write
169D000
heap
page read and write
2A3F000
heap
page read and write
F34000
heap
page read and write
14D7000
heap
page read and write
BE2000
heap
page read and write
17D0000
heap
page read and write
C01000
heap
page read and write
AA2000
heap
page read and write
1048000
heap
page read and write
162E000
heap
page read and write
F3E000
heap
page read and write
2530000
trusted library allocation
page read and write
11B6000
heap
page read and write
AD9000
heap
page read and write
17C5000
heap
page read and write
DC3000
heap
page read and write
F18000
heap
page read and write
2A37000
heap
page read and write
17C0000
heap
page read and write
1592000
heap
page read and write
17DC000
heap
page read and write
198D000
heap
page read and write
17DC000
heap
page read and write
E0B000
heap
page read and write
D13000
heap
page read and write
AC5000
heap
page read and write
D13000
heap
page read and write
11BC000
heap
page read and write
16A0000
heap
page read and write
D07000
heap
page read and write
C30000
heap
page read and write
17C6000
heap
page read and write
17D4000
heap
page read and write
E0F000
heap
page read and write
BFD000
heap
page read and write
F18000
heap
page read and write
E0F000
heap
page read and write
7FF6D8351000
unkown
page readonly
D13000
heap
page read and write
17C3000
heap
page read and write
17C3000
heap
page read and write
C01000
heap
page read and write
AD9000
heap
page read and write
DB0000
heap
page read and write
E0F000
heap
page read and write
C0D000
heap
page read and write
D10000
heap
page read and write
11BC000
heap
page read and write
17DC000
heap
page read and write
C2C000
heap
page read and write
17C6000
heap
page read and write
F2C000
heap
page read and write
17E1000
heap
page read and write
D85000
heap
page read and write
16A0000
heap
page read and write
F38000
heap
page read and write
14C1000
heap
page read and write
CDC000
heap
page read and write
F1F000
heap
page read and write
D0C000
heap
page read and write
17E1000
heap
page read and write
D24000
heap
page read and write
14D8000
heap
page read and write
2A22000
heap
page read and write
17E1000
heap
page read and write
17B0000
heap
page read and write
2A1E000
heap
page read and write
17DC000
heap
page read and write
2A2A000
heap
page read and write
D24000
heap
page read and write
D10000
heap
page read and write
29A8000
heap
page read and write
17C0000
heap
page read and write
14D7000
heap
page read and write
F44000
heap
page read and write
13D6000
heap
page read and write
17E1000
heap
page read and write
BE2000
heap
page read and write
C16000
heap
page read and write
F1E000
heap
page read and write
2C7D000
heap
page read and write
D3A000
heap
page read and write
D0E000
heap
page read and write
A73000
heap
page read and write
2A33000
heap
page read and write
7FF6D8342000
unkown
page readonly
DEC000
heap
page read and write
17C0000
heap
page read and write
E0F000
heap
page read and write
F1B000
heap
page read and write
F46000
heap
page read and write
1035000
heap
page read and write
D69000
heap
page read and write
D07000
heap
page read and write
DFC000
heap
page read and write
D07000
heap
page read and write
E0F000
heap
page read and write
2A2A000
heap
page read and write
1048000
heap
page read and write
17E1000
heap
page read and write
D85000
heap
page read and write
DB2000
heap
page read and write
16A0000
heap
page read and write
17C5000
heap
page read and write
F34000
heap
page read and write
D4F000
stack
page read and write
1452000
heap
page read and write
12D9000
heap
page read and write
DD8000
heap
page read and write
17C5000
heap
page read and write
D13000
heap
page read and write
D85000
heap
page read and write
C58000
heap
page read and write
F34000
heap
page read and write
66702000
unkown
page execute
D07000
heap
page read and write
C2C000
heap
page read and write
EDB000
heap
page read and write
D69000
heap
page read and write
11A6000
heap
page read and write
29FF000
heap
page read and write
17D0000
heap
page read and write
DD8000
heap
page read and write
BE2000
heap
page read and write
12F1000
heap
page read and write
11B6000
heap
page read and write
DD8000
heap
page read and write
17C0000
heap
page read and write
2680000
trusted library allocation
page read and write
F34000
heap
page read and write
DEC000
heap
page read and write
AD9000
heap
page read and write
17D4000
heap
page read and write
F2C000
heap
page read and write
ABD000
heap
page read and write
17C6000
heap
page read and write
7FF6D834D000
unkown
page read and write
AD9000
heap
page read and write
DA8000
heap
page read and write
1366000
heap
page read and write
DB7000
heap
page read and write
17DC000
heap
page read and write
F2C000
heap
page read and write
C16000
heap
page read and write
17D0000
heap
page read and write
F46000
heap
page read and write
F23000
heap
page read and write
17D4000
heap
page read and write
4C64000
heap
page read and write
F46000
heap
page read and write
AD9000
heap
page read and write
DC4000
heap
page read and write
1048000
heap
page read and write
1048000
heap
page read and write
C49000
heap
page read and write
DDD000
heap
page read and write
BF5000
heap
page read and write
ACA000
heap
page read and write
A9D000
heap
page read and write
10DF000
stack
page read and write
DBC000
heap
page read and write
CE8000
heap
page read and write
29FF000
heap
page read and write
17C3000
heap
page read and write
C2C000
heap
page read and write
D44000
heap
page read and write
DFC000
heap
page read and write
2A1B000
heap
page read and write
17C6000
heap
page read and write
1048000
heap
page read and write
1586000
heap
page read and write
DED000
heap
page read and write
ABD000
heap
page read and write
AD1000
heap
page read and write
DAD000
heap
page read and write
2C81000
heap
page read and write
E0F000
heap
page read and write
11BC000
heap
page read and write
1191000
heap
page read and write
BF1000
heap
page read and write
17E1000
heap
page read and write
2A1E000
heap
page read and write
E0F000
heap
page read and write
2A0E000
heap
page read and write
17C0000
heap
page read and write
BF1000
heap
page read and write
D17000
heap
page read and write
C3B000
heap
page read and write
ABD000
heap
page read and write
DFC000
heap
page read and write
DEC000
heap
page read and write
CEC000
heap
page read and write
F09000
heap
page read and write
7FF6D834F000
unkown
page readonly
DCB000
heap
page read and write
D69000
heap
page read and write
11C4000
heap
page read and write
17C3000
heap
page read and write
16BF000
heap
page read and write
C3B000
heap
page read and write
C48000
heap
page read and write
1454000
heap
page read and write
C2C000
heap
page read and write
17DC000
heap
page read and write
17C6000
heap
page read and write
11BA000
heap
page read and write
17D0000
heap
page read and write
148D000
heap
page read and write
158C000
heap
page read and write
F3E000
heap
page read and write
DA8000
heap
page read and write
D41000
heap
page read and write
AD1000
heap
page read and write
14B1000
heap
page read and write
17C3000
heap
page read and write
D85000
heap
page read and write
D0C000
heap
page read and write
1663000
heap
page read and write
17B0000
heap
page read and write
F18000
heap
page read and write
D0C000
heap
page read and write
2D00000
heap
page read and write
CFB000
heap
page read and write
DB7000
heap
page read and write
BE4000
heap
page read and write
D28000
heap
page read and write
17C1000
heap
page read and write
C0D000
heap
page read and write
17E1000
heap
page read and write
D10000
heap
page read and write
7FF6D834F000
unkown
page readonly
F3D000
heap
page read and write
17D4000
heap
page read and write
BE7000
heap
page read and write
666D1000
unkown
page readonly
17E1000
heap
page read and write
7FF6D8320000
unkown
page readonly
C05000
heap
page read and write
17B0000
heap
page read and write
E0B000
heap
page read and write
14D7000
heap
page read and write
D13000
heap
page read and write
175F000
stack
page read and write
DAD000
heap
page read and write
BF1000
heap
page read and write
E0F000
heap
page read and write
CE8000
heap
page read and write
2D00000
heap
page read and write
D24000
heap
page read and write
DB1000
heap
page read and write
A83000
heap
page read and write
66641000
unkown
page execute read
13CF000
heap
page read and write
66702000
unkown
page execute
DA0000
heap
page read and write
2A37000
heap
page read and write
17C0000
heap
page read and write
D01000
heap
page read and write
AC5000
heap
page read and write
666F4000
unkown
page write copy
17D4000
heap
page read and write
D00000
heap
page read and write
C1C000
heap
page read and write
11AD000
heap
page read and write
11BC000
heap
page read and write
1703000
heap
page read and write
7FF6D8351000
unkown
page readonly
D13000
heap
page read and write
17DC000
heap
page read and write
C24000
heap
page read and write
11B6000
heap
page read and write
F0D000
heap
page read and write
D24000
heap
page read and write
AC5000
heap
page read and write
2A2A000
heap
page read and write
C24000
heap
page read and write
BE9000
heap
page read and write
F28000
heap
page read and write
26CF000
trusted library allocation
page read and write
17C1000
heap
page read and write
DEC000
heap
page read and write
11D7000
heap
page read and write
D90000
heap
page read and write
D07000
heap
page read and write
7FF6D8351000
unkown
page readonly
1305000
heap
page read and write
ABD000
heap
page read and write
AD9000
heap
page read and write
CE8000
heap
page read and write
17C6000
heap
page read and write
D57000
heap
page read and write
D2F000
heap
page read and write
1053000
heap
page read and write
F3E000
heap
page read and write
F70000
heap
page read and write
17E1000
heap
page read and write
D13000
heap
page read and write
4F8E000
heap
page read and write
ABD000
heap
page read and write
C16000
heap
page read and write
DFC000
heap
page read and write
17D4000
heap
page read and write
BE2000
heap
page read and write
112C000
heap
page read and write
169D000
heap
page read and write
D0B000
heap
page read and write
C01000
heap
page read and write
17E1000
heap
page read and write
F46000
heap
page read and write
1332000
heap
page read and write
AC1000
heap
page read and write
1172000
heap
page read and write
DC3000
heap
page read and write
F34000
heap
page read and write
BE2000
heap
page read and write
BF1000
heap
page read and write
F22000
heap
page read and write
16E5000
heap
page read and write
2A3F000
heap
page read and write
17E1000
heap
page read and write
DBB000
heap
page read and write
2A33000
heap
page read and write
E0B000
heap
page read and write
11BC000
heap
page read and write
C16000
heap
page read and write
C0D000
heap
page read and write
C3B000
heap
page read and write
1182000
heap
page read and write
DD8000
heap
page read and write
17E1000
heap
page read and write
BF6000
heap
page read and write
17A1000
heap
page read and write
ABD000
heap
page read and write
DA8000
heap
page read and write
F28000
heap
page read and write
17DC000
heap
page read and write
1703000
heap
page read and write
C0D000
heap
page read and write
17C3000
heap
page read and write
F2C000
heap
page read and write
BE2000
heap
page read and write
F46000
heap
page read and write
CE8000
heap
page read and write
2A2A000
heap
page read and write
1362000
heap
page read and write
17C3000
heap
page read and write
F3C000
heap
page read and write
17B0000
heap
page read and write
17C0000
heap
page read and write
F1D000
heap
page read and write
DBC000
heap
page read and write
2A3A000
heap
page read and write
11C4000
heap
page read and write
17D4000
heap
page read and write
2A2A000
heap
page read and write
7FF6D8320000
unkown
page readonly
A92000
heap
page read and write
17D4000
heap
page read and write
C24000
heap
page read and write
1778000
heap
page read and write
D24000
heap
page read and write
AAE000
heap
page read and write
112E000
heap
page read and write
CFB000
heap
page read and write
17D4000
heap
page read and write
DB0000
heap
page read and write
F34000
heap
page read and write
DAF000
heap
page read and write
C27000
heap
page read and write
C01000
heap
page read and write
17E1000
heap
page read and write
F09000
heap
page read and write
AC5000
heap
page read and write
16A1000
heap
page read and write
DBC000
heap
page read and write
17E1000
heap
page read and write
2C81000
heap
page read and write
2A3F000
heap
page read and write
2A30000
heap
page read and write
17E1000
heap
page read and write
E0F000
heap
page read and write
DA0000
heap
page read and write
4FC000
stack
page read and write
29F8000
heap
page read and write
16EF000
heap
page read and write
98D000
heap
page read and write
BF1000
heap
page read and write
150F000
stack
page read and write
D69000
heap
page read and write
BE2000
heap
page read and write
D85000
heap
page read and write
CE8000
heap
page read and write
17E1000
heap
page read and write
AD9000
heap
page read and write
BE2000
heap
page read and write
1048000
heap
page read and write
CFE000
heap
page read and write
17D0000
heap
page read and write
1770000
heap
page read and write
2680000
trusted library allocation
page read and write
17C6000
heap
page read and write
17B0000
heap
page read and write
DB7000
heap
page read and write
D07000
heap
page read and write
C3B000
heap
page read and write
F09000
heap
page read and write
4ED6000
heap
page read and write
1048000
heap
page read and write
DAD000
heap
page read and write
F2C000
heap
page read and write
17C3000
heap
page read and write
127E000
heap
page read and write
D07000
heap
page read and write
17D0000
heap
page read and write
17C0000
heap
page read and write
16EF000
heap
page read and write
BE9000
heap
page read and write
BE2000
heap
page read and write
DFC000
heap
page read and write
A9C000
heap
page read and write
17D0000
heap
page read and write
DD8000
heap
page read and write
7FF6D8320000
unkown
page readonly
1175000
heap
page read and write
2CA4000
heap
page read and write
2A22000
heap
page read and write
2A3D000
heap
page read and write
1500000
heap
page read and write
C68000
heap
page read and write
2C7D000
heap
page read and write
17D0000
heap
page read and write
AC5000
heap
page read and write
2A3D000
heap
page read and write
D17000
heap
page read and write
D07000
heap
page read and write
C48000
heap
page read and write
7FF6D8342000
unkown
page readonly
DB2000
heap
page read and write
C68000
heap
page read and write
17D4000
heap
page read and write
DC3000
heap
page read and write
F0C000
heap
page read and write
D52000
heap
page read and write
17E1000
heap
page read and write
CD1000
heap
page read and write
D24000
heap
page read and write
CF8000
heap
page read and write
BF1000
heap
page read and write
E0F000
heap
page read and write
1048000
heap
page read and write
17C0000
heap
page read and write
4FEF000
heap
page read and write
CE8000
heap
page read and write
BC8000
heap
page read and write
16E5000
heap
page read and write
535E000
heap
page read and write
1908000
heap
page read and write
F2C000
heap
page read and write
C3B000
heap
page read and write
F34000
heap
page read and write
AC2000
heap
page read and write
27CD000
heap
page read and write
BF1000
heap
page read and write
E0F000
heap
page read and write
2984000
heap
page read and write
23B7000
heap
page read and write
17E1000
heap
page read and write
D07000
heap
page read and write
B40000
heap
page read and write
F2C000
heap
page read and write
1192000
heap
page read and write
CF7000
heap
page read and write
D4A000
heap
page read and write
1053000
heap
page read and write
C28000
heap
page read and write
17DC000
heap
page read and write
17DC000
heap
page read and write
17C0000
heap
page read and write
17DC000
heap
page read and write
D90000
heap
page read and write
666F4000
unkown
page write copy
BF1000
heap
page read and write
F09000
heap
page read and write
118E000
heap
page read and write
E0B000
heap
page read and write
7FF6D834F000
unkown
page readonly
C0D000
heap
page read and write
16A1000
heap
page read and write
11AD000
heap
page read and write
E0B000
heap
page read and write
C01000
heap
page read and write
F2C000
heap
page read and write
2A1E000
heap
page read and write
DD8000
heap
page read and write
C2A000
heap
page read and write
2A0E000
heap
page read and write
1161000
heap
page read and write
1470000
heap
page read and write
BE1000
heap
page read and write
DBC000
heap
page read and write
BD9000
heap
page read and write
2A22000
heap
page read and write
D07000
heap
page read and write
DD8000
heap
page read and write
CEC000
heap
page read and write
53E0000
heap
page read and write
DD8000
heap
page read and write
17B0000
heap
page read and write
BE9000
heap
page read and write
D85000
heap
page read and write
EF6000
heap
page read and write
4FD000
stack
page read and write
D85000
heap
page read and write
D1D000
heap
page read and write
17E1000
heap
page read and write
1048000
heap
page read and write
1471000
heap
page read and write
17E1000
heap
page read and write
17DC000
heap
page read and write
A92000
heap
page read and write
A9D000
heap
page read and write
DC3000
heap
page read and write
DA8000
heap
page read and write
17B0000
heap
page read and write
17DC000
heap
page read and write
11D3000
heap
page read and write
BD3000
heap
page read and write
DAF000
heap
page read and write
AC5000
heap
page read and write
11B6000
heap
page read and write
C2C000
heap
page read and write
C28000
heap
page read and write
E0B000
heap
page read and write
17A0000
heap
page read and write
CED000
heap
page read and write
17E1000
heap
page read and write
D39000
heap
page read and write
7FF6D834F000
unkown
page readonly
17DC000
heap
page read and write
ABD000
heap
page read and write
DAD000
heap
page read and write
17B0000
heap
page read and write
1192000
heap
page read and write
1663000
heap
page read and write
C24000
heap
page read and write
CFD000
heap
page read and write
1191000
heap
page read and write
A80000
heap
page read and write
17C5000
heap
page read and write
F19000
heap
page read and write
BF5000
heap
page read and write
D1D000
heap
page read and write
96F000
heap
page read and write
DCB000
heap
page read and write
15C5000
heap
page read and write
11BA000
heap
page read and write
CE8000
heap
page read and write
BF5000
heap
page read and write
D24000
heap
page read and write
EAC000
heap
page read and write
DC4000
heap
page read and write
11B6000
heap
page read and write
D8F000
heap
page read and write
16AB000
heap
page read and write
16BF000
heap
page read and write
F3E000
heap
page read and write
17D0000
heap
page read and write
DAE000
heap
page read and write
7FF6D8321000
unkown
page execute read
BC8000
heap
page read and write
DD1000
heap
page read and write
D24000
heap
page read and write
16BF000
heap
page read and write
17DC000
heap
page read and write
666FA000
unkown
page readonly
1048000
heap
page read and write
BF6000
heap
page read and write
17C0000
heap
page read and write
2A3F000
heap
page read and write
CF8000
heap
page read and write
1209000
heap
page read and write
C16000
heap
page read and write
C01000
heap
page read and write
BF5000
heap
page read and write
DC3000
heap
page read and write
E0B000
heap
page read and write
D0C000
heap
page read and write
17DC000
heap
page read and write
DCB000
heap
page read and write
E0B000
heap
page read and write
11A6000
heap
page read and write
DD8000
heap
page read and write
DC3000
heap
page read and write
17DC000
heap
page read and write
C48000
heap
page read and write
118E000
heap
page read and write
F3E000
heap
page read and write
1642000
heap
page read and write
CFE000
heap
page read and write
1394000
heap
page read and write
2686000
trusted library allocation
page read and write
1E4000
heap
page read and write
16AB000
heap
page read and write
DB0000
heap
page read and write
11BC000
heap
page read and write
DFC000
heap
page read and write
F2C000
heap
page read and write
DD1000
heap
page read and write
DD1000
heap
page read and write
17E1000
heap
page read and write
C2C000
heap
page read and write
CFA000
heap
page read and write
1164000
heap
page read and write
DC4000
heap
page read and write
169C000
heap
page read and write
E0B000
heap
page read and write
D0C000
heap
page read and write
AE3000
heap
page read and write
16EF000
heap
page read and write
DEC000
heap
page read and write
C05000
heap
page read and write
DB0000
heap
page read and write
AC5000
heap
page read and write
E0F000
heap
page read and write
D13000
heap
page read and write
CDC000
heap
page read and write
17C0000
heap
page read and write
C05000
heap
page read and write
16AB000
heap
page read and write
BBC000
heap
page read and write
CFE000
heap
page read and write
F2C000
heap
page read and write
D4A000
heap
page read and write
169D000
heap
page read and write
D13000
heap
page read and write
2BA8000
heap
page read and write
17E1000
heap
page read and write
C05000
heap
page read and write
DBC000
heap
page read and write
D13000
heap
page read and write
1048000
heap
page read and write
DEC000
heap
page read and write
D9F000
heap
page read and write
17DC000
heap
page read and write
17DC000
heap
page read and write
D79000
heap
page read and write
CE8000
heap
page read and write
D0C000
heap
page read and write
F0C000
heap
page read and write
DFC000
heap
page read and write
7FF6D834D000
unkown
page write copy
7FF6D834D000
unkown
page write copy
C16000
heap
page read and write
D4A000
heap
page read and write
BE2000
heap
page read and write
F18000
heap
page read and write
C0A000
heap
page read and write
E0F000
heap
page read and write
AC5000
heap
page read and write
CFB000
heap
page read and write
D2B000
heap
page read and write
1198000
heap
page read and write
CF0000
heap
page read and write
DAB000
heap
page read and write
2A3F000
heap
page read and write
F34000
heap
page read and write
AD1000
heap
page read and write
BE9000
heap
page read and write
D51000
heap
page read and write
AC5000
heap
page read and write
16A1000
heap
page read and write
BF5000
heap
page read and write
DD8000
heap
page read and write
17D4000
heap
page read and write
7FF6D834F000
unkown
page readonly
D69000
heap
page read and write
666F4000
unkown
page write copy
CFC000
heap
page read and write
C28000
heap
page read and write
17D4000
heap
page read and write
C24000
heap
page read and write
E0F000
heap
page read and write
CFD000
heap
page read and write
BFD000
heap
page read and write
2A3F000
heap
page read and write
1586000
heap
page read and write
2C7D000
heap
page read and write
11AD000
heap
page read and write
17E1000
heap
page read and write
2A3A000
heap
page read and write
D0C000
heap
page read and write
AD9000
heap
page read and write
F18000
heap
page read and write
DD8000
heap
page read and write
BFC000
heap
page read and write
E0F000
heap
page read and write
F3D000
heap
page read and write
17C6000
heap
page read and write
DA8000
heap
page read and write
AD9000
heap
page read and write
E0F000
heap
page read and write
BCB000
heap
page read and write
17B0000
heap
page read and write
B58000
heap
page read and write
DD1000
heap
page read and write
E5E000
heap
page read and write
DD8000
heap
page read and write
BF1000
heap
page read and write
DEC000
heap
page read and write
D13000
heap
page read and write
4F6C000
heap
page read and write
1032000
heap
page read and write
17DC000
heap
page read and write
E0F000
heap
page read and write
E0F000
heap
page read and write
D1D000
heap
page read and write
1344000
heap
page read and write
14DE000
heap
page read and write
DC3000
heap
page read and write
F34000
heap
page read and write
17E1000
heap
page read and write
AAE000
heap
page read and write
DED000
heap
page read and write
A83000
heap
page read and write
E0B000
heap
page read and write
D24000
heap
page read and write
17B0000
heap
page read and write
AA6000
heap
page read and write
1048000
heap
page read and write
2680000
trusted library allocation
page read and write
2680000
trusted library allocation
page read and write
2A3F000
heap
page read and write
17DC000
heap
page read and write
17E1000
heap
page read and write
AD9000
heap
page read and write
EE7000
heap
page read and write
666F2000
unkown
page read and write
BC8000
heap
page read and write
17DC000
heap
page read and write
1301000
heap
page read and write
DA0000
heap
page read and write
D13000
heap
page read and write
1053000
heap
page read and write
DA8000
heap
page read and write
1181000
heap
page read and write
C16000
heap
page read and write
17D4000
heap
page read and write
2A0E000
heap
page read and write
17B0000
heap
page read and write
17C6000
heap
page read and write
17D0000
heap
page read and write
C3B000
heap
page read and write
17E1000
heap
page read and write
DD1000
heap
page read and write
DFC000
heap
page read and write
139E000
heap
page read and write
BD9000
heap
page read and write
D69000
heap
page read and write
7FF6D8320000
unkown
page readonly
17E1000
heap
page read and write
DD1000
heap
page read and write
17C0000
heap
page read and write
DC4000
heap
page read and write
D24000
heap
page read and write
16A0000
heap
page read and write
16CF000
heap
page read and write
16EF000
heap
page read and write
DFC000
heap
page read and write
D69000
heap
page read and write
D0C000
heap
page read and write
17B0000
heap
page read and write
7FF6D8321000
unkown
page execute read
DC4000
heap
page read and write
11A2000
heap
page read and write
17CB000
heap
page read and write
1048000
heap
page read and write
16A0000
heap
page read and write
16BF000
heap
page read and write
BF1000
heap
page read and write
2A2A000
heap
page read and write
F30000
heap
page read and write
11BA000
heap
page read and write
DFC000
heap
page read and write
BF2000
heap
page read and write
AAD000
heap
page read and write
CFD000
heap
page read and write
C2F000
heap
page read and write
17E1000
heap
page read and write
17C3000
heap
page read and write
17E1000
heap
page read and write
DD1000
heap
page read and write
D52000
heap
page read and write
C28000
heap
page read and write
A9D000
heap
page read and write
37B3000
heap
page read and write
CF8000
heap
page read and write
16A0000
heap
page read and write
D52000
heap
page read and write
1172000
heap
page read and write
17C0000
heap
page read and write
DA8000
heap
page read and write
DAF000
heap
page read and write
D79000
heap
page read and write
DC4000
heap
page read and write
D07000
heap
page read and write
17E1000
heap
page read and write
17E1000
heap
page read and write
C3B000
heap
page read and write
D90000
heap
page read and write
16BF000
heap
page read and write
BDD000
heap
page read and write
AA3000
heap
page read and write
401000
unkown
page execute read
DEC000
heap
page read and write
17C6000
heap
page read and write
17B0000
heap
page read and write
17C6000
heap
page read and write
A95000
heap
page read and write
17E1000
heap
page read and write
14B0000
heap
page read and write
103C000
heap
page read and write
1395000
heap
page read and write
C16000
heap
page read and write
CE8000
heap
page read and write
17E1000
heap
page read and write
F44000
heap
page read and write
164B000
heap
page read and write
17C3000
heap
page read and write
F46000
heap
page read and write
DFC000
heap
page read and write
A80000
heap
page read and write
DAF000
heap
page read and write
666F4000
unkown
page write copy
D04000
heap
page read and write
5EBC000
heap
page read and write
17C3000
heap
page read and write
BF9000
heap
page read and write
C68000
heap
page read and write
F2C000
heap
page read and write
17C0000
heap
page read and write
15D8000
heap
page read and write
4D61000
heap
page read and write
17D0000
heap
page read and write
16A1000
heap
page read and write
F3E000
heap
page read and write
E0F000
heap
page read and write
F34000
heap
page read and write
DC3000
heap
page read and write
C48000
heap
page read and write
BE2000
heap
page read and write
17E1000
heap
page read and write
16AB000
heap
page read and write
F38000
heap
page read and write
17B0000
heap
page read and write
2A1E000
heap
page read and write
66702000
unkown
page execute
AD9000
heap
page read and write
17B0000
heap
page read and write
DD8000
heap
page read and write
13AE000
heap
page read and write
164B000
heap
page read and write
DD1000
heap
page read and write
D03000
heap
page read and write
AD9000
heap
page read and write
CF7000
heap
page read and write
116F000
stack
page read and write
D0C000
heap
page read and write
F28000
heap
page read and write
DD8000
heap
page read and write
AE1000
heap
page read and write
17B0000
heap
page read and write
17D0000
heap
page read and write
66706000
unkown
page readonly
D13000
heap
page read and write
DEC000
heap
page read and write
11BA000
heap
page read and write
AA6000
heap
page read and write
E0B000
heap
page read and write
DFC000
heap
page read and write
7FF6D8350000
unkown
page read and write
C01000
heap
page read and write
7FF6D8350000
unkown
page read and write
DB7000
heap
page read and write
17C5000
heap
page read and write
C3B000
heap
page read and write
1381000
heap
page read and write
17B0000
heap
page read and write
BB4000
heap
page read and write
A83000
heap
page read and write
C3B000
heap
page read and write
DC4000
heap
page read and write
17D0000
heap
page read and write
7FF6D834F000
unkown
page readonly
7FF6D8342000
unkown
page readonly
D24000
heap
page read and write
666F2000
unkown
page read and write
E0F000
heap
page read and write
F2C000
heap
page read and write
DD8000
heap
page read and write
CFC000
heap
page read and write
C24000
heap
page read and write
A9D000
heap
page read and write
AAE000
heap
page read and write
D2A000
heap
page read and write
AAE000
heap
page read and write
1C43000
heap
page read and write
D24000
heap
page read and write
1703000
heap
page read and write
D90000
heap
page read and write
2A33000
heap
page read and write
2A1B000
heap
page read and write
DFC000
heap
page read and write
13C3000
heap
page read and write
AD9000
heap
page read and write
CDC000
heap
page read and write
D24000
heap
page read and write
2A1E000
heap
page read and write
D85000
heap
page read and write
17B0000
heap
page read and write
A77000
heap
page read and write
17DC000
heap
page read and write
17E1000
heap
page read and write
F46000
heap
page read and write
17DC000
heap
page read and write
2A1E000
heap
page read and write
DC4000
heap
page read and write
2A22000
heap
page read and write
17D0000
heap
page read and write
A93000
heap
page read and write
7FF6D8350000
unkown
page write copy
14D2000
heap
page read and write
17DC000
heap
page read and write
F3E000
heap
page read and write
AA6000
heap
page read and write
1048000
heap
page read and write
CFB000
heap
page read and write
DFC000
heap
page read and write
17B0000
heap
page read and write
BE2000
heap
page read and write
16EF000
heap
page read and write
119D000
heap
page read and write
F09000
heap
page read and write
C24000
heap
page read and write
16A0000
heap
page read and write
DD8000
heap
page read and write
DFC000
heap
page read and write
C16000
heap
page read and write
11BA000
heap
page read and write
DFC000
heap
page read and write
D0C000
heap
page read and write
F44000
heap
page read and write
17D4000
heap
page read and write
DEC000
heap
page read and write
102E000
heap
page read and write
E0F000
heap
page read and write
2B05000
heap
page read and write
17E1000
heap
page read and write
17D0000
heap
page read and write
CEC000
heap
page read and write
F09000
heap
page read and write
1048000
heap
page read and write
B9D000
stack
page read and write
840000
heap
page read and write
D79000
heap
page read and write
11A6000
heap
page read and write
DD8000
heap
page read and write
DC3000
heap
page read and write
DEC000
heap
page read and write
3072000
heap
page read and write
DC3000
heap
page read and write
DAB000
heap
page read and write
D97000
heap
page read and write
E0F000
heap
page read and write
DEC000
heap
page read and write
119F000
heap
page read and write
CBE000
heap
page read and write
A92000
heap
page read and write
5E70000
heap
page read and write
DD1000
heap
page read and write
17E1000
heap
page read and write
DB7000
heap
page read and write
16CF000
heap
page read and write
17D4000
heap
page read and write
29F0000
heap
page read and write
10E1000
heap
page read and write
DD8000
heap
page read and write
7FF6D834D000
unkown
page write copy
D69000
heap
page read and write
14C1000
heap
page read and write
C24000
heap
page read and write
F46000
heap
page read and write
11BC000
heap
page read and write
2530000
trusted library allocation
page read and write
17B0000
heap
page read and write
D24000
heap
page read and write
16A0000
heap
page read and write
F44000
heap
page read and write
ABD000
heap
page read and write
2A2A000
heap
page read and write
1048000
heap
page read and write
C24000
heap
page read and write
16A2000
heap
page read and write
17C0000
heap
page read and write
C3B000
heap
page read and write
DB7000
heap
page read and write
C24000
heap
page read and write
17C3000
heap
page read and write
F28000
heap
page read and write
D03000
heap
page read and write
F44000
heap
page read and write
E0F000
heap
page read and write
3C47000
heap
page read and write
D69000
heap
page read and write
17E1000
heap
page read and write
29EC000
heap
page read and write
DFC000
heap
page read and write
E0B000
heap
page read and write
117D000
heap
page read and write
DD1000
heap
page read and write
1703000
heap
page read and write
F23000
heap
page read and write
D85000
heap
page read and write
C3B000
heap
page read and write
CDB000
heap
page read and write
17E1000
heap
page read and write
17CA000
heap
page read and write
A97000
heap
page read and write
DD8000
heap
page read and write
17E1000
heap
page read and write
17D0000
heap
page read and write
AD9000
heap
page read and write
14D7000
heap
page read and write
4F09000
heap
page read and write
16E5000
heap
page read and write
17E1000
heap
page read and write
11BC000
heap
page read and write
DFC000
heap
page read and write
37A5000
heap
page read and write
1048000
heap
page read and write
DEC000
heap
page read and write
C24000
heap
page read and write
17D4000
heap
page read and write
11B6000
heap
page read and write
140D000
heap
page read and write
E0F000
heap
page read and write
F28000
heap
page read and write
BD9000
heap
page read and write
F34000
heap
page read and write
17D0000
heap
page read and write
17DC000
heap
page read and write
17C0000
heap
page read and write
2A22000
heap
page read and write
C01000
heap
page read and write
ABD000
heap
page read and write
DEC000
heap
page read and write
D52000
heap
page read and write
F18000
heap
page read and write
ABD000
heap
page read and write
BF1000
heap
page read and write
BCC000
heap
page read and write
17E1000
heap
page read and write
132C000
heap
page read and write
17B0000
heap
page read and write
CFD000
heap
page read and write
DBF000
heap
page read and write
C0D000
heap
page read and write
DEC000
heap
page read and write
F3E000
heap
page read and write
D69000
heap
page read and write
17D0000
heap
page read and write
B9B000
heap
page read and write
17C1000
heap
page read and write
DD8000
heap
page read and write
66640000
unkown
page readonly
26CF000
trusted library allocation
page read and write
BE1000
heap
page read and write
DEC000
heap
page read and write
D13000
heap
page read and write
17DC000
heap
page read and write
D85000
heap
page read and write
17E1000
heap
page read and write
1377000
heap
page read and write
DFC000
heap
page read and write
1048000
heap
page read and write
17D4000
heap
page read and write
17C0000
heap
page read and write
165E000
heap
page read and write
A67000
heap
page read and write
9A0000
heap
page read and write
17D4000
heap
page read and write
D24000
heap
page read and write
D13000
heap
page read and write
C68000
heap
page read and write
C05000
heap
page read and write
D90000
heap
page read and write
158C000
heap
page read and write
D69000
heap
page read and write
2A0E000
heap
page read and write
17D0000
heap
page read and write
F2C000
heap
page read and write
2A33000
heap
page read and write
D85000
heap
page read and write
1425000
heap
page read and write
1191000
heap
page read and write
158C000
heap
page read and write
4D1F000
heap
page read and write
AA6000
heap
page read and write
15C6000
heap
page read and write
D69000
heap
page read and write
D1D000
heap
page read and write
17E1000
heap
page read and write
17C3000
heap
page read and write
139B000
heap
page read and write
D9F000
heap
page read and write
BF2000
heap
page read and write
BFD000
heap
page read and write
C16000
heap
page read and write
666F4000
unkown
page write copy
17DC000
heap
page read and write
D0C000
heap
page read and write
16A1000
heap
page read and write
1035000
heap
page read and write
BE2000
heap
page read and write
1160000
heap
page read and write
F34000
heap
page read and write
7FF6D834F000
unkown
page readonly
17DC000
heap
page read and write
26CF000
trusted library allocation
page read and write
A34000
heap
page read and write
17C3000
heap
page read and write
DD1000
heap
page read and write
14D7000
heap
page read and write
1677000
heap
page read and write
DEC000
heap
page read and write
11A1000
heap
page read and write
DFC000
heap
page read and write
17D4000
heap
page read and write
17C0000
heap
page read and write
CB2000
heap
page read and write
D1D000
heap
page read and write
2680000
trusted library allocation
page read and write
17DC000
heap
page read and write
16A1000
heap
page read and write
DED000
heap
page read and write
BFD000
heap
page read and write
7FF6D8342000
unkown
page readonly
F09000
heap
page read and write
119D000
heap
page read and write
C3C000
heap
page read and write
17D4000
heap
page read and write
17B0000
heap
page read and write
1048000
heap
page read and write
DEC000
heap
page read and write
11B6000
heap
page read and write
666D1000
unkown
page readonly
11D3000
heap
page read and write
1164000
heap
page read and write
F46000
heap
page read and write
BE2000
heap
page read and write
17B0000
heap
page read and write
AD2000
heap
page read and write
13E1000
heap
page read and write
DC3000
heap
page read and write
C3C000
heap
page read and write
C3B000
heap
page read and write
DD8000
heap
page read and write
DAD000
heap
page read and write
F3E000
heap
page read and write
1048000
heap
page read and write
16A1000
heap
page read and write
D2B000
heap
page read and write
16A1000
heap
page read and write
F34000
heap
page read and write
C3C000
heap
page read and write
AD9000
heap
page read and write
169D000
heap
page read and write
BF4000
heap
page read and write
DFC000
heap
page read and write
A95000
heap
page read and write
C01000
heap
page read and write
DC4000
heap
page read and write
16EF000
heap
page read and write
C58000
heap
page read and write
1154000
heap
page read and write
DEC000
heap
page read and write
666D1000
unkown
page readonly
11AD000
heap
page read and write
11BC000
heap
page read and write
2A34000
heap
page read and write
17C0000
heap
page read and write
DBF000
heap
page read and write
136C000
heap
page read and write
ABD000
heap
page read and write
AC5000
heap
page read and write
A83000
heap
page read and write
CF7000
heap
page read and write
DEC000
heap
page read and write
E0B000
heap
page read and write
AAE000
heap
page read and write
4C61000
heap
page read and write
5E37000
heap
page read and write
17DC000
heap
page read and write
DA0000
heap
page read and write
D90000
heap
page read and write
66706000
unkown
page readonly
17E1000
heap
page read and write
1EF2000
heap
page read and write
DD1000
heap
page read and write
17B0000
heap
page read and write
DEC000
heap
page read and write
DD8000
heap
page read and write
CFC000
heap
page read and write
F46000
heap
page read and write
DA8000
heap
page read and write
DB7000
heap
page read and write
17D0000
heap
page read and write
D85000
heap
page read and write
C2A000
heap
page read and write
BFD000
heap
page read and write
CE8000
heap
page read and write
DFC000
heap
page read and write
2A1B000
heap
page read and write
A9A000
heap
page read and write
F2C000
heap
page read and write
2C7D000
heap
page read and write
F3E000
heap
page read and write
E0F000
heap
page read and write
C01000
heap
page read and write
DD8000
heap
page read and write
1697000
heap
page read and write
2A33000
heap
page read and write
17D0000
heap
page read and write
9BE000
heap
page read and write
A7B000
heap
page read and write
C0D000
heap
page read and write
DFC000
heap
page read and write
17C3000
heap
page read and write
143D000
heap
page read and write
F3E000
heap
page read and write
17B0000
heap
page read and write
5E37000
heap
page read and write
CF7000
heap
page read and write
E0F000
heap
page read and write
1642000
heap
page read and write
1048000
heap
page read and write
17C5000
heap
page read and write
17DC000
heap
page read and write
17E1000
heap
page read and write
17A1000
heap
page read and write
F2C000
heap
page read and write
11BC000
heap
page read and write
E0F000
heap
page read and write
16BF000
heap
page read and write
D85000
heap
page read and write
D24000
heap
page read and write
DCB000
heap
page read and write
CF7000
heap
page read and write
BA7000
heap
page read and write
17E1000
heap
page read and write
2A1E000
heap
page read and write
17E1000
heap
page read and write
CDC000
heap
page read and write
17DC000
heap
page read and write
17D0000
heap
page read and write
EF8000
heap
page read and write
26CF000
trusted library allocation
page read and write
F34000
heap
page read and write
1048000
heap
page read and write
CF8000
heap
page read and write
DB7000
heap
page read and write
DA8000
heap
page read and write
C05000
heap
page read and write
E0F000
heap
page read and write
B78000
heap
page read and write
C2D000
heap
page read and write
CE8000
heap
page read and write
C24000
heap
page read and write
2680000
trusted library allocation
page read and write
1703000
heap
page read and write
17C0000
heap
page read and write
1195000
heap
page read and write
CF7000
heap
page read and write
C48000
heap
page read and write
C01000
heap
page read and write
2C04000
heap
page read and write
F44000
heap
page read and write
17B0000
heap
page read and write
D1D000
heap
page read and write
EAC000
heap
page read and write
17D0000
heap
page read and write
F09000
heap
page read and write
C27000
heap
page read and write
2C88000
heap
page read and write
17DC000
heap
page read and write
D0C000
heap
page read and write
1164000
heap
page read and write
16C8000
heap
page read and write
1703000
heap
page read and write
1632000
heap
page read and write
666F2000
unkown
page read and write
DB3000
heap
page read and write
DA8000
heap
page read and write
17C0000
heap
page read and write
FC0000
heap
page read and write
17DC000
heap
page read and write
C3B000
heap
page read and write
DBC000
heap
page read and write
2A2A000
heap
page read and write
C3B000
heap
page read and write
1142000
heap
page read and write
D1D000
heap
page read and write
F1E000
heap
page read and write
CFC000
heap
page read and write
C84000
heap
page read and write
F1D000
heap
page read and write
16E5000
heap
page read and write
117A000
heap
page read and write
E0F000
heap
page read and write
F3D000
heap
page read and write
C01000
heap
page read and write
E0B000
heap
page read and write
2A3A000
heap
page read and write
C2C000
heap
page read and write
16EF000
heap
page read and write
DB7000
heap
page read and write
2C7D000
heap
page read and write
4CC4000
heap
page read and write
AA2000
heap
page read and write
17DC000
heap
page read and write
CEC000
heap
page read and write
CE8000
heap
page read and write
17C3000
heap
page read and write
E0F000
heap
page read and write
F44000
heap
page read and write
160F000
heap
page read and write
2686000
trusted library allocation
page read and write
F18000
heap
page read and write
D35000
heap
page read and write
CE8000
heap
page read and write
C05000
heap
page read and write
143F000
heap
page read and write
11C2000
heap
page read and write
2A0E000
heap
page read and write
DBC000
heap
page read and write
17C5000
heap
page read and write
BB4000
heap
page read and write
17E1000
heap
page read and write
AAE000
heap
page read and write
DC4000
heap
page read and write
17C3000
heap
page read and write
7FF6D8351000
unkown
page readonly
BFD000
heap
page read and write
DCB000
heap
page read and write
2A30000
heap
page read and write
F2C000
heap
page read and write
DD8000
heap
page read and write
E0B000
heap
page read and write
17D0000
heap
page read and write
D97000
heap
page read and write
17D0000
heap
page read and write
17B0000
heap
page read and write
BE1000
heap
page read and write
9BA000
heap
page read and write
17D4000
heap
page read and write
17DC000
heap
page read and write
B60000
heap
page read and write
29FF000
heap
page read and write
DB7000
heap
page read and write
F46000
heap
page read and write
AA6000
heap
page read and write
11A1000
heap
page read and write
17D0000
heap
page read and write
DB3000
heap
page read and write
C3B000
heap
page read and write
BCA000
heap
page read and write
1356000
heap
page read and write
1703000
heap
page read and write
7FF6D8350000
unkown
page write copy
17E1000
heap
page read and write
DEC000
heap
page read and write
17DC000
heap
page read and write
D69000
heap
page read and write
17D0000
heap
page read and write
11BC000
heap
page read and write
11B6000
heap
page read and write
972000
heap
page read and write
E0F000
heap
page read and write
14DB000
heap
page read and write
17C5000
heap
page read and write
937000
heap
page read and write
14F1000
heap
page read and write
C68000
heap
page read and write
F46000
heap
page read and write
17E1000
heap
page read and write
17E1000
heap
page read and write
C32000
heap
page read and write
C49000
heap
page read and write
BF1000
heap
page read and write
CF7000
heap
page read and write
ACC000
heap
page read and write
E0B000
heap
page read and write
AD9000
heap
page read and write
AA6000
heap
page read and write
C05000
heap
page read and write
14F1000
heap
page read and write
1048000
heap
page read and write
DCB000
heap
page read and write
8D1000
heap
page read and write
17C0000
heap
page read and write
C0D000
heap
page read and write
CE8000
heap
page read and write
1398000
heap
page read and write
CE8000
heap
page read and write
F2C000
heap
page read and write
C16000
heap
page read and write
881000
heap
page read and write
BF5000
heap
page read and write
D24000
heap
page read and write
7FF6D8320000
unkown
page readonly
14D7000
heap
page read and write
E0B000
heap
page read and write
2680000
trusted library allocation
page read and write
DFC000
heap
page read and write
1425000
heap
page read and write
17D4000
heap
page read and write
F34000
heap
page read and write
F28000
heap
page read and write
4D3F000
heap
page read and write
17C3000
heap
page read and write
D24000
heap
page read and write
AAE000
heap
page read and write
16E5000
heap
page read and write
2A3F000
heap
page read and write
2A0E000
heap
page read and write
9BF000
stack
page read and write
7FF6D834F000
unkown
page readonly
BB4000
heap
page read and write
AD1000
heap
page read and write
D05000
heap
page read and write
DA8000
heap
page read and write
F34000
heap
page read and write
F2C000
heap
page read and write
41BC000
heap
page read and write
DA8000
heap
page read and write
DFC000
heap
page read and write
2A22000
heap
page read and write
DBC000
heap
page read and write
17C3000
heap
page read and write
5EEC000
heap
page read and write
2A33000
heap
page read and write
17C5000
heap
page read and write
F19000
heap
page read and write
DB0000
heap
page read and write
17C0000
heap
page read and write
D0C000
heap
page read and write
F3E000
heap
page read and write
D0C000
heap
page read and write
D60000
heap
page read and write
AA2000
heap
page read and write
DBC000
heap
page read and write
AC5000
heap
page read and write
C27000
heap
page read and write
A80000
heap
page read and write
D13000
heap
page read and write
BED000
heap
page read and write
14BD000
heap
page read and write
DD8000
heap
page read and write
2A30000
heap
page read and write
E0B000
heap
page read and write
C24000
heap
page read and write
7FF6D834D000
unkown
page read and write
C16000
heap
page read and write
1166000
heap
page read and write
1048000
heap
page read and write
17B0000
heap
page read and write
4DD2000
heap
page read and write
16A0000
heap
page read and write
D11000
heap
page read and write
11B6000
heap
page read and write
29FC000
heap
page read and write
16BF000
heap
page read and write
F20000
heap
page read and write
161C000
heap
page read and write
17E1000
heap
page read and write
BE2000
heap
page read and write
17D0000
heap
page read and write
17C6000
heap
page read and write
DCB000
heap
page read and write
F19000
heap
page read and write
17E1000
heap
page read and write
E0F000
heap
page read and write
E0B000
heap
page read and write
C16000
heap
page read and write
BE1000
heap
page read and write
F2C000
heap
page read and write
D24000
heap
page read and write
DB0000
heap
page read and write
1703000
heap
page read and write
1491000
heap
page read and write
CB6000
heap
page read and write
D85000
heap
page read and write
139E000
heap
page read and write
17C0000
heap
page read and write
4181000
heap
page read and write
DDD000
heap
page read and write
F1E000
heap
page read and write
A93000
heap
page read and write
E0B000
heap
page read and write
4D8F000
heap
page read and write
DC3000
heap
page read and write
DFC000
heap
page read and write
7FF6D834F000
unkown
page readonly
AC5000
heap
page read and write
666F2000
unkown
page read and write
17E1000
heap
page read and write
DB0000
heap
page read and write
7FF6D834F000
unkown
page readonly
DA0000
heap
page read and write
16E5000
heap
page read and write
CF7000
heap
page read and write
5460000
heap
page read and write
D9F000
heap
page read and write
DFC000
heap
page read and write
A86000
heap
page read and write
CE8000
heap
page read and write
169D000
heap
page read and write
17E1000
heap
page read and write
F1D000
heap
page read and write
C24000
heap
page read and write
DAF000
heap
page read and write
F09000
heap
page read and write
9BD000
heap
page read and write
DB8000
heap
page read and write
DC4000
heap
page read and write
D07000
heap
page read and write
CFB000
heap
page read and write
DB5000
heap
page read and write
F28000
heap
page read and write
11AD000
heap
page read and write
D13000
heap
page read and write
C01000
heap
page read and write
16E5000
heap
page read and write
E0B000
heap
page read and write
16A0000
heap
page read and write
BE4000
heap
page read and write
F46000
heap
page read and write
790000
heap
page read and write
17D0000
heap
page read and write
D69000
heap
page read and write
2C7D000
heap
page read and write
BF1000
heap
page read and write
BF5000
heap
page read and write
7FF6D8320000
unkown
page readonly
BF1000
heap
page read and write
17DC000
heap
page read and write
F01000
heap
page read and write
D00000
heap
page read and write
1632000
heap
page read and write
17C6000
heap
page read and write
17E1000
heap
page read and write
CFE000
heap
page read and write
17C3000
heap
page read and write
F18000
heap
page read and write
DA0000
heap
page read and write
DEC000
heap
page read and write
17C3000
heap
page read and write
119E000
heap
page read and write
17C3000
heap
page read and write
1663000
heap
page read and write
1048000
heap
page read and write
2A1B000
heap
page read and write
16A0000
heap
page read and write
AC5000
heap
page read and write
16A0000
heap
page read and write
A93000
heap
page read and write
14D7000
heap
page read and write
17D4000
heap
page read and write
17C0000
heap
page read and write
DD8000
heap
page read and write
16BF000
heap
page read and write
A83000
heap
page read and write
7FF6D8342000
unkown
page readonly
C58000
heap
page read and write
DEC000
heap
page read and write
ABD000
heap
page read and write
17B0000
heap
page read and write
CF7000
heap
page read and write
1562000
heap
page read and write
BF1000
heap
page read and write
1048000
heap
page read and write
7FF6D8350000
unkown
page read and write
BF1000
heap
page read and write
34C000
stack
page read and write
17E1000
heap
page read and write
118E000
heap
page read and write
AD1000
heap
page read and write
ABD000
heap
page read and write
E0B000
heap
page read and write
7FF6D834D000
unkown
page read and write
11D4000
heap
page read and write
17D4000
heap
page read and write
DD1000
heap
page read and write
DFC000
heap
page read and write
158C000
heap
page read and write
DBF000
heap
page read and write
DEC000
heap
page read and write
DD8000
heap
page read and write
17E1000
heap
page read and write
C3B000
heap
page read and write
CF8000
heap
page read and write
17DC000
heap
page read and write
F34000
heap
page read and write
17DC000
heap
page read and write
17C6000
heap
page read and write
17B0000
heap
page read and write
13E1000
heap
page read and write
D0C000
heap
page read and write
379A000
heap
page read and write
17DC000
heap
page read and write
E0F000
heap
page read and write
400000
unkown
page readonly
DC4000
heap
page read and write
DA0000
heap
page read and write
C3B000
heap
page read and write
C16000
heap
page read and write
F2C000
heap
page read and write
16A1000
heap
page read and write
17C5000
heap
page read and write
F18000
heap
page read and write
CE8000
heap
page read and write
C16000
heap
page read and write
66702000
unkown
page execute
17E1000
heap
page read and write
1181000
heap
page read and write
DD8000
heap
page read and write
D69000
heap
page read and write
17D4000
heap
page read and write
17E1000
heap
page read and write
BFD000
heap
page read and write
ABD000
heap
page read and write
17D4000
heap
page read and write
14A6000
heap
page read and write
C0D000
heap
page read and write
AD9000
heap
page read and write
1E0000
heap
page read and write
4F5D000
heap
page read and write
2680000
trusted library allocation
page read and write
5EA1000
heap
page read and write
DA8000
heap
page read and write
C2C000
heap
page read and write
2A00000
heap
page read and write
C24000
heap
page read and write
2A33000
heap
page read and write
ABD000
heap
page read and write
17D4000
heap
page read and write
C16000
heap
page read and write
2A1E000
heap
page read and write
127D000
heap
page read and write
F19000
heap
page read and write
11D3000
heap
page read and write
17E1000
heap
page read and write
139E000
heap
page read and write
F28000
heap
page read and write
F3E000
heap
page read and write
CFC000
heap
page read and write
F3D000
heap
page read and write
14F1000
heap
page read and write
DBF000
heap
page read and write
2686000
trusted library allocation
page read and write
F46000
heap
page read and write
BF1000
heap
page read and write
D24000
heap
page read and write
1048000
heap
page read and write
F3E000
heap
page read and write
C01000
heap
page read and write
4C5C000
heap
page read and write
16A0000
heap
page read and write
C3C000
heap
page read and write
BE1000
heap
page read and write
E0F000
heap
page read and write
17B0000
heap
page read and write
DFC000
heap
page read and write
14F1000
heap
page read and write
17C6000
heap
page read and write
D85000
heap
page read and write
BEB000
heap
page read and write
17D0000
heap
page read and write
4D6F000
heap
page read and write
DD1000
heap
page read and write
11B6000
heap
page read and write
17C5000
heap
page read and write
1703000
heap
page read and write
E0B000
heap
page read and write
11B6000
heap
page read and write
DD8000
heap
page read and write
17C6000
heap
page read and write
C3B000
heap
page read and write
17D4000
heap
page read and write
1274000
heap
page read and write
AD9000
heap
page read and write
11BC000
heap
page read and write
17C6000
heap
page read and write
4D1F000
heap
page read and write
29C8000
heap
page read and write
2C7D000
heap
page read and write
190000
heap
page read and write
11AD000
heap
page read and write
C3B000
heap
page read and write
16F0000
heap
page read and write
D85000
heap
page read and write
DEC000
heap
page read and write
C3B000
heap
page read and write
2C7C000
heap
page read and write
DFC000
heap
page read and write
1048000
heap
page read and write
C24000
heap
page read and write
AD9000
heap
page read and write
DA8000
heap
page read and write
17D4000
heap
page read and write
17C0000
heap
page read and write
DBF000
heap
page read and write
D13000
heap
page read and write
DD8000
heap
page read and write
17DC000
heap
page read and write
DC3000
heap
page read and write
17D4000
heap
page read and write
C01000
heap
page read and write
17DC000
heap
page read and write
11B6000
heap
page read and write
16A0000
heap
page read and write
D00000
heap
page read and write
17D4000
heap
page read and write
C24000
heap
page read and write
C68000
heap
page read and write
17E1000
heap
page read and write
DAB000
heap
page read and write
17C3000
heap
page read and write
17E1000
heap
page read and write
2964000
heap
page read and write
BCF000
heap
page read and write
DAF000
heap
page read and write
CF7000
heap
page read and write
17C6000
heap
page read and write
17C0000
heap
page read and write
BF5000
heap
page read and write
ACD000
heap
page read and write
D24000
heap
page read and write
F19000
heap
page read and write
17E1000
heap
page read and write
F2C000
heap
page read and write
17E1000
heap
page read and write
F04000
heap
page read and write
F46000
heap
page read and write
50A1000
heap
page read and write
E0F000
heap
page read and write
93E000
stack
page read and write
1048000
heap
page read and write
17C0000
heap
page read and write
CF8000
heap
page read and write
17E1000
heap
page read and write
CF7000
heap
page read and write
16E5000
heap
page read and write
1475000
heap
page read and write
17E1000
heap
page read and write
1048000
heap
page read and write
DD8000
heap
page read and write
AAD000
heap
page read and write
1048000
heap
page read and write
CFB000
heap
page read and write
AC5000
heap
page read and write
1185000
heap
page read and write
17C3000
heap
page read and write
D24000
heap
page read and write
C28000
heap
page read and write
DED000
heap
page read and write
17D0000
heap
page read and write
11C4000
heap
page read and write
17D0000
heap
page read and write
144B000
heap
page read and write
17C0000
heap
page read and write
13E4000
heap
page read and write
BE2000
heap
page read and write
BF5000
heap
page read and write
2A1E000
heap
page read and write
C3B000
heap
page read and write
C3B000
heap
page read and write
F2C000
heap
page read and write
D00000
heap
page read and write
DD8000
heap
page read and write
1703000
heap
page read and write
17B0000
heap
page read and write
DFC000
heap
page read and write
17C5000
heap
page read and write
17DC000
heap
page read and write
2C7D000
heap
page read and write
BE4000
heap
page read and write
DD8000
heap
page read and write
DA8000
heap
page read and write
7FF6D8351000
unkown
page readonly
16E5000
heap
page read and write
DAD000
heap
page read and write
1192000
heap
page read and write
DFC000
heap
page read and write
2A3F000
heap
page read and write
E0F000
heap
page read and write
C58000
heap
page read and write
1183000
heap
page read and write
17D4000
heap
page read and write
C28000
heap
page read and write
DED000
heap
page read and write
144B000
heap
page read and write
DB7000
heap
page read and write
17C5000
heap
page read and write
C16000
heap
page read and write
17C3000
heap
page read and write
16A1000
heap
page read and write
26CF000
trusted library allocation
page read and write
17B0000
heap
page read and write
E0B000
heap
page read and write
E0F000
heap
page read and write
17C6000
heap
page read and write
1048000
heap
page read and write
2C7D000
heap
page read and write
F44000
heap
page read and write
F3C000
heap
page read and write
DFC000
heap
page read and write
17D4000
heap
page read and write
666FA000
unkown
page readonly
D8F000
heap
page read and write
DBC000
heap
page read and write
4F42000
heap
page read and write
BFD000
heap
page read and write
D69000
heap
page read and write
169D000
heap
page read and write
CFB000
heap
page read and write
17C1000
heap
page read and write
DEC000
heap
page read and write
11C4000
heap
page read and write
DB7000
heap
page read and write
C45000
heap
page read and write
D13000
heap
page read and write
4CAF000
heap
page read and write
DC3000
heap
page read and write
1364000
heap
page read and write
A93000
heap
page read and write
1994000
heap
page read and write
2A30000
heap
page read and write
C48000
heap
page read and write
11BC000
heap
page read and write
F44000
heap
page read and write
14DD000
heap
page read and write
7FF6D8342000
unkown
page readonly
D52000
heap
page read and write
187D000
heap
page read and write
CE8000
heap
page read and write
E0B000
heap
page read and write
17CB000
heap
page read and write
F38000
heap
page read and write
1879000
heap
page read and write
E0B000
heap
page read and write
14F1000
heap
page read and write
AE1000
heap
page read and write
F18000
heap
page read and write
17D0000
heap
page read and write
D92000
heap
page read and write
A92000
heap
page read and write
D00000
heap
page read and write
666D1000
unkown
page readonly
16A0000
heap
page read and write
F1D000
heap
page read and write
DED000
heap
page read and write
DB7000
heap
page read and write
D24000
heap
page read and write
F46000
heap
page read and write
C24000
heap
page read and write
DC3000
heap
page read and write
2C7D000
heap
page read and write
17D0000
heap
page read and write
17B0000
heap
page read and write
AAE000
heap
page read and write
17D4000
heap
page read and write
AAE000
heap
page read and write
BE6000
heap
page read and write
C01000
heap
page read and write
17D0000
heap
page read and write
4381000
heap
page read and write
F28000
heap
page read and write
BF1000
heap
page read and write
C28000
heap
page read and write
BE2000
heap
page read and write
17B0000
heap
page read and write
29FF000
heap
page read and write
DFC000
heap
page read and write
F44000
heap
page read and write
DFC000
heap
page read and write
F1B000
heap
page read and write
F18000
heap
page read and write
17D4000
heap
page read and write
D4A000
heap
page read and write
BF1000
heap
page read and write
2C91000
heap
page read and write
1185000
heap
page read and write
14D7000
heap
page read and write
D0C000
heap
page read and write
AC5000
heap
page read and write
BEC000
heap
page read and write
D1D000
heap
page read and write
AC5000
heap
page read and write
CFB000
heap
page read and write
C3C000
heap
page read and write
C24000
heap
page read and write
88F000
stack
page read and write
1048000
heap
page read and write
DD8000
heap
page read and write
11A6000
heap
page read and write
A92000
heap
page read and write
2A37000
heap
page read and write
C05000
heap
page read and write
ABD000
heap
page read and write
3795000
heap
page read and write
C05000
heap
page read and write
DFC000
heap
page read and write
F3D000
heap
page read and write
F3E000
heap
page read and write
17C3000
heap
page read and write
DD8000
heap
page read and write
17DC000
heap
page read and write
4F8F000
heap
page read and write
D0C000
heap
page read and write
DA8000
heap
page read and write
C24000
heap
page read and write
29FF000
heap
page read and write
1048000
heap
page read and write
17C6000
heap
page read and write
BF1000
heap
page read and write
D85000
heap
page read and write
C2C000
heap
page read and write
DB7000
heap
page read and write
DBF000
heap
page read and write
17D4000
heap
page read and write
140D000
heap
page read and write
DCB000
heap
page read and write
2A34000
heap
page read and write
D7C000
heap
page read and write
16BF000
heap
page read and write
CFE000
heap
page read and write
CFC000
heap
page read and write
17D4000
heap
page read and write
42FD000
heap
page read and write
17C5000
heap
page read and write
29EC000
heap
page read and write
C24000
heap
page read and write
C16000
heap
page read and write
F44000
heap
page read and write
17DC000
heap
page read and write
17E1000
heap
page read and write
BE6000
heap
page read and write
1BA3000
heap
page read and write
17D0000
heap
page read and write
17DC000
heap
page read and write
DD1000
heap
page read and write
17D4000
heap
page read and write
17C6000
heap
page read and write
17B0000
heap
page read and write
17E1000
heap
page read and write
DD1000
heap
page read and write
17D4000
heap
page read and write
17C5000
heap
page read and write
2A0E000
heap
page read and write
16CF000
heap
page read and write
D24000
heap
page read and write
D24000
heap
page read and write
AA1000
heap
page read and write
AD9000
heap
page read and write
17C3000
heap
page read and write
16E5000
heap
page read and write
D1D000
heap
page read and write
C14000
heap
page read and write
17C0000
heap
page read and write
D00000
heap
page read and write
AD9000
heap
page read and write
F1E000
heap
page read and write
17B0000
heap
page read and write
CFF000
heap
page read and write
C58000
heap
page read and write
2C81000
heap
page read and write
DB7000
heap
page read and write
66641000
unkown
page execute read
17E1000
heap
page read and write
AD9000
heap
page read and write
11BA000
heap
page read and write
E0F000
heap
page read and write
F3D000
heap
page read and write
C24000
heap
page read and write
F3E000
heap
page read and write
16CF000
heap
page read and write
17E1000
heap
page read and write
CFC000
heap
page read and write
1048000
heap
page read and write
17D0000
heap
page read and write
ABD000
heap
page read and write
17DC000
heap
page read and write
EE3000
heap
page read and write
DBC000
heap
page read and write
D10000
heap
page read and write
17D4000
heap
page read and write
DA0000
heap
page read and write
F3E000
heap
page read and write
BF1000
heap
page read and write
C0D000
heap
page read and write
17D4000
heap
page read and write
1048000
heap
page read and write
E0F000
heap
page read and write
1592000
heap
page read and write
C24000
heap
page read and write
2680000
trusted library allocation
page read and write
11BC000
heap
page read and write
DFC000
heap
page read and write
F3D000
heap
page read and write
AC5000
heap
page read and write
CF0000
heap
page read and write
C0D000
heap
page read and write
F3D000
heap
page read and write
DD1000
heap
page read and write
F2C000
heap
page read and write
13A2000
heap
page read and write
DC3000
heap
page read and write
1662000
heap
page read and write
17E1000
heap
page read and write
17C5000
heap
page read and write
2A2A000
heap
page read and write
DA8000
heap
page read and write
DEC000
heap
page read and write
DD8000
heap
page read and write
666F2000
unkown
page read and write
AA3000
heap
page read and write
11B6000
heap
page read and write
1172000
heap
page read and write
DFC000
heap
page read and write
DFC000
heap
page read and write
CDF000
heap
page read and write
AA2000
heap
page read and write
D9F000
heap
page read and write
BE1000
heap
page read and write
DBF000
heap
page read and write
11B6000
heap
page read and write
D24000
heap
page read and write
7FF6D8350000
unkown
page read and write
DA8000
heap
page read and write
F3E000
heap
page read and write
1412000
heap
page read and write
C05000
heap
page read and write
1053000
heap
page read and write
17D4000
heap
page read and write
17DC000
heap
page read and write
17E1000
heap
page read and write
17C3000
heap
page read and write
F34000
heap
page read and write
DFC000
heap
page read and write
1C29000
heap
page read and write
7FF6D8350000
unkown
page read and write
F18000
heap
page read and write
D0C000
heap
page read and write
DD1000
heap
page read and write
C24000
heap
page read and write
D76000
heap
page read and write
17DC000
heap
page read and write
AAE000
heap
page read and write
1445000
heap
page read and write
11AD000
heap
page read and write
164B000
heap
page read and write
AC7000
heap
page read and write
17B0000
heap
page read and write
C16000
heap
page read and write
C0D000
heap
page read and write
17E1000
heap
page read and write
CFF000
heap
page read and write
D10000
heap
page read and write
127E000
heap
page read and write
4E3E000
heap
page read and write
A92000
heap
page read and write
17E1000
heap
page read and write
11B6000
heap
page read and write
DD1000
heap
page read and write
D85000
heap
page read and write
DB7000
heap
page read and write
17C3000
heap
page read and write
A83000
heap
page read and write
ABD000
heap
page read and write
17E1000
heap
page read and write
17DC000
heap
page read and write
C27000
heap
page read and write
150000
heap
page read and write
666F2000
unkown
page read and write
BF1000
heap
page read and write
17C3000
heap
page read and write
14D000
stack
page read and write
F3E000
heap
page read and write
BFD000
heap
page read and write
17DC000
heap
page read and write
C2D000
heap
page read and write
DA8000
heap
page read and write
26CF000
trusted library allocation
page read and write
1181000
heap
page read and write
17B0000
heap
page read and write
D69000
heap
page read and write
1032000
heap
page read and write
C28000
heap
page read and write
D88000
heap
page read and write
DED000
heap
page read and write
CFE000
heap
page read and write
D19000
heap
page read and write
ABD000
heap
page read and write
DFC000
heap
page read and write
C4E000
heap
page read and write
17DC000
heap
page read and write
17D0000
heap
page read and write
F23000
heap
page read and write
DD8000
heap
page read and write
DFC000
heap
page read and write
2A3A000
heap
page read and write
E0F000
heap
page read and write
CEC000
heap
page read and write
F2A000
heap
page read and write
E0F000
heap
page read and write
2A1E000
heap
page read and write
A7C000
heap
page read and write
AC5000
heap
page read and write
E0F000
heap
page read and write
17C6000
heap
page read and write
E0B000
heap
page read and write
DB0000
heap
page read and write
1191000
heap
page read and write
C09000
heap
page read and write
2A08000
heap
page read and write
C3B000
heap
page read and write
AA2000
heap
page read and write
AA2000
heap
page read and write
DFC000
heap
page read and write
17C6000
heap
page read and write
29FC000
heap
page read and write
1048000
heap
page read and write
C58000
heap
page read and write
ACA000
heap
page read and write
144B000
heap
page read and write
17D4000
heap
page read and write
CF7000
heap
page read and write
4CAF000
heap
page read and write
16A1000
heap
page read and write
F3E000
heap
page read and write
D07000
heap
page read and write
ABD000
heap
page read and write
11AD000
heap
page read and write
2A33000
heap
page read and write
1191000
heap
page read and write
1182000
heap
page read and write
D07000
heap
page read and write
400000
unkown
page readonly
AD9000
heap
page read and write
F09000
heap
page read and write
DFC000
heap
page read and write
17B0000
heap
page read and write
157D000
heap
page read and write
17E1000
heap
page read and write
15A1000
heap
page read and write
BFD000
heap
page read and write
29FF000
heap
page read and write
1425000
heap
page read and write
AC5000
heap
page read and write
1B6A000
heap
page read and write
CE8000
heap
page read and write
2C7D000
heap
page read and write
499000
heap
page read and write
13E1000
heap
page read and write
7C0000
heap
page read and write
DBC000
heap
page read and write
17E1000
heap
page read and write
2A1E000
heap
page read and write
2A30000
heap
page read and write
66706000
unkown
page readonly
BC4000
heap
page read and write
17E1000
heap
page read and write
D79000
heap
page read and write
7FF6D8351000
unkown
page readonly
D13000
heap
page read and write
167D000
heap
page read and write
17D4000
heap
page read and write
DD1000
heap
page read and write
2A30000
heap
page read and write
2951000
heap
page read and write
F09000
heap
page read and write
DD8000
heap
page read and write
D13000
heap
page read and write
D41000
heap
page read and write
F46000
heap
page read and write
17E1000
heap
page read and write
7FF6D8350000
unkown
page read and write
C58000
heap
page read and write
E0B000
heap
page read and write
EAC000
heap
page read and write
C16000
heap
page read and write
BE1000
heap
page read and write
17E1000
heap
page read and write
1048000
heap
page read and write
D24000
heap
page read and write
17C3000
heap
page read and write
4CB0000
heap
page read and write
2A3F000
heap
page read and write
1515000
heap
page read and write
AD9000
heap
page read and write
1703000
heap
page read and write
D1D000
heap
page read and write
29EC000
heap
page read and write
1650000
heap
page read and write
ABD000
heap
page read and write
17DC000
heap
page read and write
2A3F000
heap
page read and write
E0F000
heap
page read and write
DAD000
heap
page read and write
17C0000
heap
page read and write
D17000
heap
page read and write
F09000
heap
page read and write
D69000
heap
page read and write
161E000
heap
page read and write
C2A000
heap
page read and write
17D0000
heap
page read and write
BB0000
heap
page read and write
C28000
heap
page read and write
D0C000
heap
page read and write
F2C000
heap
page read and write
C3B000
heap
page read and write
570000
heap
page read and write
CB2000
heap
page read and write
66641000
unkown
page execute read
ABF000
heap
page read and write
F18000
heap
page read and write
2B4E000
heap
page read and write
DEC000
heap
page read and write
29EC000
heap
page read and write
BF1000
heap
page read and write
D90000
heap
page read and write
EF6000
heap
page read and write
CE8000
heap
page read and write
C24000
heap
page read and write
C0D000
heap
page read and write
17D0000
heap
page read and write
14F9000
heap
page read and write
F46000
heap
page read and write
17E1000
heap
page read and write
D0C000
heap
page read and write
29FF000
heap
page read and write
DD8000
heap
page read and write
DFC000
heap
page read and write
89C000
heap
page read and write
F34000
heap
page read and write
AAE000
heap
page read and write
DAD000
heap
page read and write
BB4000
heap
page read and write
C3B000
heap
page read and write
666F4000
unkown
page write copy
C84000
heap
page read and write
BF1000
heap
page read and write
D39000
heap
page read and write
DD8000
heap
page read and write
D49000
heap
page read and write
C28000
heap
page read and write
C68000
heap
page read and write
17C0000
heap
page read and write
1598000
heap
page read and write
14D7000
heap
page read and write
CEC000
heap
page read and write
F09000
heap
page read and write
D90000
heap
page read and write
DC3000
heap
page read and write
17DC000
heap
page read and write
11AD000
heap
page read and write
DFC000
heap
page read and write
7FF6D8321000
unkown
page execute read
1195000
heap
page read and write
D07000
heap
page read and write
7FF6D8342000
unkown
page readonly
E0F000
heap
page read and write
11BA000
heap
page read and write
13E1000
heap
page read and write
DED000
heap
page read and write
C49000
heap
page read and write
BF1000
heap
page read and write
D13000
heap
page read and write
14DB000
heap
page read and write
17E1000
heap
page read and write
66641000
unkown
page execute read
17C6000
heap
page read and write
17C3000
heap
page read and write
DCB000
heap
page read and write
F46000
heap
page read and write
C05000
heap
page read and write
17B0000
heap
page read and write
DBC000
heap
page read and write
29FF000
heap
page read and write
16A0000
heap
page read and write
F09000
heap
page read and write
C68000
heap
page read and write
ABD000
heap
page read and write
2B15000
heap
page read and write
17C6000
heap
page read and write
17D0000
heap
page read and write
2A3A000
heap
page read and write
4CB0000
heap
page read and write
DC4000
heap
page read and write
17DC000
heap
page read and write
C2C000
heap
page read and write
BB4000
heap
page read and write
1694000
heap
page read and write
F18000
heap
page read and write
BE0000
heap
page read and write
C01000
heap
page read and write
DD1000
heap
page read and write
C3C000
heap
page read and write
E0F000
heap
page read and write
D13000
heap
page read and write
C05000
heap
page read and write
C24000
heap
page read and write
7FF6D8320000
unkown
page readonly
DB7000
heap
page read and write
DD8000
heap
page read and write
F18000
heap
page read and write
F28000
heap
page read and write
29C0000
heap
page read and write
F19000
heap
page read and write
17E1000
heap
page read and write
2A12000
heap
page read and write
F2C000
heap
page read and write
DA8000
heap
page read and write
F44000
heap
page read and write
17D4000
heap
page read and write
17C5000
heap
page read and write
2AD7000
heap
page read and write
D13000
heap
page read and write
11BA000
heap
page read and write
14D7000
heap
page read and write
DD8000
heap
page read and write
43D8000
heap
page read and write
DC3000
heap
page read and write
29EC000
heap
page read and write
DFC000
heap
page read and write
C3B000
heap
page read and write
17D0000
heap
page read and write
17D0000
heap
page read and write
C01000
heap
page read and write
26CF000
trusted library allocation
page read and write
17E1000
heap
page read and write
E0B000
heap
page read and write
17B0000
heap
page read and write
1048000
heap
page read and write
17D0000
heap
page read and write
16A0000
heap
page read and write
1592000
heap
page read and write
1164000
heap
page read and write
166D000
heap
page read and write
C01000
heap
page read and write
C35000
heap
page read and write
DB7000
heap
page read and write
A92000
heap
page read and write
2CA1000
heap
page read and write
17C3000
heap
page read and write
16A0000
heap
page read and write
1172000
heap
page read and write
BFD000
heap
page read and write
1192000
heap
page read and write
F46000
heap
page read and write
17B0000
heap
page read and write
BF2000
heap
page read and write
F09000
heap
page read and write
CCA000
heap
page read and write
4200000
heap
page read and write
DFC000
heap
page read and write
7FF6D834F000
unkown
page readonly
DAF000
heap
page read and write
C68000
heap
page read and write
E0F000
heap
page read and write
AD9000
heap
page read and write
C16000
heap
page read and write
F1B000
heap
page read and write
17D0000
heap
page read and write
187A000
heap
page read and write
7FF6D8350000
unkown
page write copy
DAF000
heap
page read and write
F2C000
heap
page read and write
DBC000
heap
page read and write
1035000
heap
page read and write
16E5000
heap
page read and write
16A1000
heap
page read and write
FD0000
heap
page read and write
5E4F000
heap
page read and write
17DC000
heap
page read and write
1774000
heap
page read and write
F28000
heap
page read and write
DA8000
heap
page read and write
E0F000
heap
page read and write
17E1000
heap
page read and write
17C5000
heap
page read and write
C16000
heap
page read and write
2A33000
heap
page read and write
7FF6D834F000
unkown
page readonly
17D4000
heap
page read and write
DA0000
heap
page read and write
A92000
heap
page read and write
DFC000
heap
page read and write
118E000
heap
page read and write
BE7000
heap
page read and write
DD8000
heap
page read and write
16A0000
heap
page read and write
29EC000
heap
page read and write
E0F000
heap
page read and write
138D000
heap
page read and write
17B0000
heap
page read and write
2B15000
heap
page read and write
17D4000
heap
page read and write
F28000
heap
page read and write
F28000
heap
page read and write
17D4000
heap
page read and write
16A1000
heap
page read and write
DB7000
heap
page read and write
F3E000
heap
page read and write
BFD000
heap
page read and write
DCB000
heap
page read and write
1DAA000
heap
page read and write
C0D000
heap
page read and write
AD1000
heap
page read and write
1541000
heap
page read and write
C24000
heap
page read and write
17E1000
heap
page read and write
D69000
heap
page read and write
C2F000
heap
page read and write
17CB000
heap
page read and write
37AE000
heap
page read and write
17D4000
heap
page read and write
DC3000
heap
page read and write
C28000
heap
page read and write
11AD000
heap
page read and write
C01000
heap
page read and write
C0D000
heap
page read and write
D17000
heap
page read and write
F18000
heap
page read and write
DC3000
heap
page read and write
17B0000
heap
page read and write
C16000
heap
page read and write
DA8000
heap
page read and write
DED000
heap
page read and write
29EC000
heap
page read and write
C0D000
heap
page read and write
17B0000
heap
page read and write
D13000
heap
page read and write
14AB000
heap
page read and write
C24000
heap
page read and write
29EC000
heap
page read and write
D05000
heap
page read and write
DA0000
heap
page read and write
D49000
heap
page read and write
17E1000
heap
page read and write
DBF000
heap
page read and write
CFD000
heap
page read and write
ABD000
heap
page read and write
CF8000
heap
page read and write
D24000
heap
page read and write
DD1000
heap
page read and write
CEC000
heap
page read and write
29FC000
heap
page read and write
1598000
heap
page read and write
F2C000
heap
page read and write
14DD000
heap
page read and write
C16000
heap
page read and write
C30000
heap
page read and write
17D4000
heap
page read and write
2A1E000
heap
page read and write
2CCE000
heap
page read and write
C16000
heap
page read and write
D2A000
heap
page read and write
ABD000
heap
page read and write
17DC000
heap
page read and write
1192000
heap
page read and write
17C6000
heap
page read and write
DD1000
heap
page read and write
4D61000
heap
page read and write
BF1000
heap
page read and write
AA6000
heap
page read and write
1D9B000
heap
page read and write
16E5000
heap
page read and write
DC3000
heap
page read and write
F3D000
heap
page read and write
2CA2000
heap
page read and write
D85000
heap
page read and write
17D0000
heap
page read and write
D3D000
heap
page read and write
11BA000
heap
page read and write
14CE000
heap
page read and write
17CB000
heap
page read and write
17C0000
heap
page read and write
DD8000
heap
page read and write
14D7000
heap
page read and write
ABD000
heap
page read and write
D69000
heap
page read and write
BC8000
heap
page read and write
ABD000
heap
page read and write
7FF6D834F000
unkown
page readonly
D24000
heap
page read and write
BB4000
heap
page read and write
D80000
heap
page read and write
C24000
heap
page read and write
17C6000
heap
page read and write
C3B000
heap
page read and write
DA8000
heap
page read and write
17E1000
heap
page read and write
DA8000
heap
page read and write
DC3000
heap
page read and write
2A3F000
heap
page read and write
DD8000
heap
page read and write
BF1000
heap
page read and write
17DC000
heap
page read and write
F34000
heap
page read and write
F19000
heap
page read and write
D69000
heap
page read and write
BF5000
heap
page read and write
C2C000
heap
page read and write
CEC000
heap
page read and write
2A33000
heap
page read and write
AD1000
heap
page read and write
2A33000
heap
page read and write
17D0000
heap
page read and write
16EF000
heap
page read and write
17D0000
heap
page read and write
BE1000
heap
page read and write
11B6000
heap
page read and write
F1B000
heap
page read and write
AD1000
heap
page read and write
16A1000
heap
page read and write
D24000
heap
page read and write
DFC000
heap
page read and write
11DF000
heap
page read and write
1048000
heap
page read and write
1356000
heap
page read and write
E0B000
heap
page read and write
A93000
heap
page read and write
29EC000
heap
page read and write
C49000
heap
page read and write
1191000
heap
page read and write
F34000
heap
page read and write
BF5000
heap
page read and write
E0B000
heap
page read and write
13E1000
heap
page read and write
17E1000
heap
page read and write
D07000
heap
page read and write
2A0E000
heap
page read and write
F09000
heap
page read and write
AD9000
heap
page read and write
17D4000
heap
page read and write
DB0000
heap
page read and write
F2C000
heap
page read and write
17D4000
heap
page read and write
DBC000
heap
page read and write
ABD000
heap
page read and write
17C0000
heap
page read and write
16A5000
heap
page read and write
D17000
heap
page read and write
C16000
heap
page read and write
F3D000
heap
page read and write
D85000
heap
page read and write
ECD000
heap
page read and write
17D0000
heap
page read and write
1048000
heap
page read and write
2762000
heap
page read and write
A67000
heap
page read and write
D0C000
heap
page read and write
CEC000
heap
page read and write
17E1000
heap
page read and write
17C5000
heap
page read and write
DC3000
heap
page read and write
CFB000
heap
page read and write
C24000
heap
page read and write
11D3000
heap
page read and write
EDF000
heap
page read and write
D17000
heap
page read and write
C16000
heap
page read and write
BE8000
heap
page read and write
17D0000
heap
page read and write
D24000
heap
page read and write
AA2000
heap
page read and write
F3D000
heap
page read and write
DFC000
heap
page read and write
F46000
heap
page read and write
17D4000
heap
page read and write
DBF000
heap
page read and write
CFD000
heap
page read and write
D1D000
heap
page read and write
119E000
heap
page read and write
17E1000
heap
page read and write
13E1000
heap
page read and write
F30000
heap
page read and write
DEC000
heap
page read and write
D03000
heap
page read and write
DED000
heap
page read and write
BE2000
heap
page read and write
F22000
heap
page read and write
DEC000
heap
page read and write
CE8000
heap
page read and write
DD8000
heap
page read and write
16A1000
heap
page read and write
17DC000
heap
page read and write
DCB000
heap
page read and write
13E4000
heap
page read and write
DFC000
heap
page read and write
E0F000
heap
page read and write
2A1E000
heap
page read and write
F18000
heap
page read and write
17DC000
heap
page read and write
AC5000
heap
page read and write
16A1000
heap
page read and write
2A30000
heap
page read and write
C58000
heap
page read and write
17D4000
heap
page read and write
C05000
heap
page read and write
2D01000
heap
page read and write
F34000
heap
page read and write
D0C000
heap
page read and write
BE2000
heap
page read and write
F1B000
heap
page read and write
17B0000
heap
page read and write
16CF000
heap
page read and write
3793000
heap
page read and write
DA8000
heap
page read and write
DAB000
heap
page read and write
C3B000
heap
page read and write
2C7D000
heap
page read and write
C33000
heap
page read and write
A7C000
heap
page read and write
17D4000
heap
page read and write
F28000
heap
page read and write
17C0000
heap
page read and write
163B000
heap
page read and write
DB7000
heap
page read and write
16B3000
heap
page read and write
C32000
heap
page read and write
17E1000
heap
page read and write
BFA000
heap
page read and write
2C7D000
heap
page read and write
11D7000
heap
page read and write
16CF000
heap
page read and write
1310000
heap
page read and write
CFB000
heap
page read and write
17C5000
heap
page read and write
17E1000
heap
page read and write
BF8000
heap
page read and write
D13000
heap
page read and write
DAD000
heap
page read and write
D0B000
heap
page read and write
17E1000
heap
page read and write
500000
heap
page read and write
D9F000
heap
page read and write
CE8000
heap
page read and write
F18000
heap
page read and write
17C3000
heap
page read and write
F30000
heap
page read and write
A93000
heap
page read and write
D10000
heap
page read and write
DFC000
heap
page read and write
1598000
heap
page read and write
E0F000
heap
page read and write
F3E000
heap
page read and write
16CF000
heap
page read and write
F3E000
heap
page read and write
14D3000
heap
page read and write
9BE000
heap
page read and write
D2F000
heap
page read and write
2A2A000
heap
page read and write
DEC000
heap
page read and write
169C000
heap
page read and write
10ED000
heap
page read and write
AC1000
heap
page read and write
F38000
heap
page read and write
2686000
trusted library allocation
page read and write
F03000
heap
page read and write
17B0000
heap
page read and write
D13000
heap
page read and write
EAC000
heap
page read and write
26CF000
trusted library allocation
page read and write
11DE000
heap
page read and write
C01000
heap
page read and write
16EF000
heap
page read and write
BFD000
heap
page read and write
17E1000
heap
page read and write
D05000
heap
page read and write
ABF000
stack
page read and write
E0B000
heap
page read and write
17D4000
heap
page read and write
CFD000
heap
page read and write
C0D000
heap
page read and write
DB7000
heap
page read and write
DAF000
heap
page read and write
DB7000
heap
page read and write
4C7F000
heap
page read and write
1048000
heap
page read and write
17C6000
heap
page read and write
BE2000
heap
page read and write
F19000
heap
page read and write
DD8000
heap
page read and write
D24000
heap
page read and write
1583000
heap
page read and write
11BC000
heap
page read and write
C15000
heap
page read and write
DBC000
heap
page read and write
400000
unkown
page readonly
7FF6D8342000
unkown
page readonly
DC4000
heap
page read and write
F34000
heap
page read and write
1592000
heap
page read and write
2A3F000
heap
page read and write
AC5000
heap
page read and write
11D3000
heap
page read and write
17B0000
heap
page read and write
BF1000
heap
page read and write
C27000
heap
page read and write
DD8000
heap
page read and write
DB0000
heap
page read and write
17B0000
heap
page read and write
D41000
heap
page read and write
BF1000
heap
page read and write
2A2A000
heap
page read and write
1703000
heap
page read and write
3FAF000
heap
page read and write
DEC000
heap
page read and write
5EEC000
heap
page read and write
17C5000
heap
page read and write
1425000
heap
page read and write
1182000
heap
page read and write
17E1000
heap
page read and write
BF1000
heap
page read and write
D09000
heap
page read and write
17D4000
heap
page read and write
E4F000
stack
page read and write
17B0000
heap
page read and write
DAB000
heap
page read and write
16EF000
heap
page read and write
DEC000
heap
page read and write
177B000
heap
page read and write
C3B000
heap
page read and write
DD1000
heap
page read and write
17B0000
heap
page read and write
C0D000
heap
page read and write
AD9000
heap
page read and write
DFC000
heap
page read and write
C58000
heap
page read and write
17C5000
heap
page read and write
17E1000
heap
page read and write
CE8000
heap
page read and write
17C0000
heap
page read and write
BFD000
heap
page read and write
C68000
heap
page read and write
17C0000
heap
page read and write
2CAF000
heap
page read and write
29FC000
heap
page read and write
1164000
heap
page read and write
17C5000
heap
page read and write
2A08000
heap
page read and write
C24000
heap
page read and write
DEC000
heap
page read and write
C24000
heap
page read and write
2A22000
heap
page read and write
BD9000
heap
page read and write
DA8000
heap
page read and write
1197000
heap
page read and write
E0F000
heap
page read and write
DEC000
heap
page read and write
1053000
heap
page read and write
1450000
heap
page read and write
DA0000
heap
page read and write
BF5000
heap
page read and write
F3E000
heap
page read and write
CE8000
heap
page read and write
11BA000
heap
page read and write
DBF000
stack
page read and write
D6F000
heap
page read and write
2A1D000
heap
page read and write
16A0000
heap
page read and write
CFC000
heap
page read and write
DD8000
heap
page read and write
DBC000
heap
page read and write
490000
heap
page read and write
66702000
unkown
page execute
5ECC000
heap
page read and write
188B000
heap
page read and write
16EE000
heap
page read and write
D07000
heap
page read and write
17D0000
heap
page read and write
17E1000
heap
page read and write
BDD000
heap
page read and write
DB7000
heap
page read and write
17C6000
heap
page read and write
DEC000
heap
page read and write
16CF000
heap
page read and write
16A1000
heap
page read and write
1136000
heap
page read and write
CFE000
heap
page read and write
D0C000
heap
page read and write
C24000
heap
page read and write
1142000
heap
page read and write
9B4000
heap
page read and write
160000
heap
page read and write
F3E000
heap
page read and write
AC5000
heap
page read and write
419000
unkown
page write copy
DD1000
heap
page read and write
1662000
heap
page read and write
C2C000
heap
page read and write
E50000
heap
page read and write
D0C000
heap
page read and write
F34000
heap
page read and write
29FF000
heap
page read and write
17B0000
heap
page read and write
176E000
heap
page read and write
D35000
heap
page read and write
17C0000
heap
page read and write
17C6000
heap
page read and write
EF4000
heap
page read and write
D13000
heap
page read and write
D13000
heap
page read and write
176C000
heap
page read and write
17E1000
heap
page read and write
17C0000
heap
page read and write
BF1000
heap
page read and write
17D4000
heap
page read and write
D85000
heap
page read and write
2686000
trusted library allocation
page read and write
F3E000
heap
page read and write
17E1000
heap
page read and write
1271000
heap
page read and write
CD3000
heap
page read and write
A4E000
heap
page read and write
D79000
heap
page read and write
C16000
heap
page read and write
DA8000
heap
page read and write
A92000
heap
page read and write
F3E000
heap
page read and write
DD8000
heap
page read and write
666D1000
unkown
page readonly
17B0000
heap
page read and write
AC5000
heap
page read and write
E0F000
heap
page read and write
DC4000
heap
page read and write
1048000
heap
page read and write
16A1000
heap
page read and write
A7C000
heap
page read and write
7FF6D8351000
unkown
page readonly
BF6000
heap
page read and write
11AD000
heap
page read and write
D13000
heap
page read and write
9B8000
heap
page read and write
C3B000
heap
page read and write
29B4000
heap
page read and write
DD8000
heap
page read and write
F1E000
heap
page read and write
102D000
heap
page read and write
F19000
heap
page read and write
A76000
heap
page read and write
17E1000
heap
page read and write
D07000
heap
page read and write
1703000
heap
page read and write
1703000
heap
page read and write
C3B000
heap
page read and write
DA8000
heap
page read and write
F18000
heap
page read and write
ABD000
heap
page read and write
7FF6D8351000
unkown
page readonly
14D6000
heap
page read and write
DFC000
heap
page read and write
D97000
heap
page read and write
D69000
heap
page read and write
7FF6D8320000
unkown
page readonly
E0F000
heap
page read and write
17C0000
heap
page read and write
1181000
heap
page read and write
1048000
heap
page read and write
AD9000
heap
page read and write
16A0000
heap
page read and write
2B51000
heap
page read and write
BF1000
heap
page read and write
1181000
heap
page read and write
DD8000
heap
page read and write
C0D000
heap
page read and write
BF5000
heap
page read and write
26D7000
heap
page read and write
17C2000
heap
page read and write
169D000
heap
page read and write
11B6000
heap
page read and write
1992000
heap
page read and write
11A1000
heap
page read and write
F28000
heap
page read and write
AD9000
heap
page read and write
DA8000
heap
page read and write
AD9000
heap
page read and write
7FF6D8321000
unkown
page execute read
AAE000
heap
page read and write
E0F000
heap
page read and write
1565000
heap
page read and write
F2C000
heap
page read and write
D00000
heap
page read and write
D0C000
heap
page read and write
1053000
heap
page read and write
CF7000
heap
page read and write
13E1000
heap
page read and write
E0F000
heap
page read and write
17DC000
heap
page read and write
D64000
heap
page read and write
17D4000
heap
page read and write
D69000
heap
page read and write
DEC000
heap
page read and write
1B91000
heap
page read and write
D24000
heap
page read and write
DD8000
heap
page read and write
F19000
heap
page read and write
AC5000
heap
page read and write
17DC000
heap
page read and write
A91000
heap
page read and write
BF1000
heap
page read and write
17B0000
heap
page read and write
F2C000
heap
page read and write
C37000
heap
page read and write
D4A000
heap
page read and write
4D8F000
heap
page read and write
DC3000
heap
page read and write
17B0000
heap
page read and write
16A1000
heap
page read and write
17B0000
heap
page read and write
D85000
heap
page read and write
1481000
heap
page read and write
DC3000
heap
page read and write
7C0000
heap
page read and write
ABD000
heap
page read and write
BF1000
heap
page read and write
17D0000
heap
page read and write
DD8000
heap
page read and write
F1B000
heap
page read and write
17D0000
heap
page read and write
D0C000
heap
page read and write
DB0000
heap
page read and write
1786000
heap
page read and write
DB7000
heap
page read and write
E0F000
heap
page read and write
C24000
heap
page read and write
BF4000
heap
page read and write
E0B000
heap
page read and write
DAD000
heap
page read and write
17DC000
heap
page read and write
DA8000
heap
page read and write
D24000
heap
page read and write
11DF000
heap
page read and write
163A000
heap
page read and write
A40000
heap
page read and write
17B0000
heap
page read and write
17D4000
heap
page read and write
DD8000
heap
page read and write
DFC000
heap
page read and write
ABD000
heap
page read and write
16EF000
heap
page read and write
AD9000
heap
page read and write
1175000
heap
page read and write
F18000
heap
page read and write
E0F000
heap
page read and write
DB0000
heap
page read and write
17E1000
heap
page read and write
D90000
heap
page read and write
DFC000
heap
page read and write
ED0000
heap
page read and write
C16000
heap
page read and write
17DC000
heap
page read and write
17C0000
heap
page read and write
11B6000
heap
page read and write
DEC000
heap
page read and write
17E1000
heap
page read and write
1425000
heap
page read and write
CF7000
heap
page read and write
DED000
heap
page read and write
66706000
unkown
page readonly
16BF000
heap
page read and write
DFC000
heap
page read and write
D1D000
heap
page read and write
2A0E000
heap
page read and write
17D0000
heap
page read and write
AC5000
heap
page read and write
A95000
heap
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
BE8000
heap
page read and write
17D0000
heap
page read and write
17E1000
heap
page read and write
1165000
heap
page read and write
17DC000
heap
page read and write
E0F000
heap
page read and write
17DC000
heap
page read and write
1303000
heap
page read and write
F0D000
heap
page read and write
17D4000
heap
page read and write
2A22000
heap
page read and write
17B0000
heap
page read and write
E0B000
heap
page read and write
17D4000
heap
page read and write
D13000
heap
page read and write
F34000
heap
page read and write
17D0000
heap
page read and write
17E1000
heap
page read and write
E51000
heap
page read and write
D85000
heap
page read and write
C24000
heap
page read and write
DC3000
heap
page read and write
DFC000
heap
page read and write
11B6000
heap
page read and write
16A1000
heap
page read and write
183E000
heap
page read and write
17DC000
heap
page read and write
16A1000
heap
page read and write
17D0000
heap
page read and write
AC5000
heap
page read and write
A92000
heap
page read and write
17D0000
heap
page read and write
F3E000
heap
page read and write
E0F000
heap
page read and write
18BE000
heap
page read and write
CE8000
heap
page read and write
DFC000
heap
page read and write
2C81000
heap
page read and write
EF6000
heap
page read and write
2A1E000
heap
page read and write
1204000
heap
page read and write
17E1000
heap
page read and write
F3E000
heap
page read and write
DD8000
heap
page read and write
E0F000
heap
page read and write
DB7000
heap
page read and write
CFB000
heap
page read and write
17C6000
heap
page read and write
29FC000
heap
page read and write
1EEA000
heap
page read and write
17DC000
heap
page read and write
1662000
heap
page read and write
CFE000
heap
page read and write
2A33000
heap
page read and write
DFC000
heap
page read and write
4D48000
heap
page read and write
D85000
heap
page read and write
F34000
heap
page read and write
17E1000
heap
page read and write
D76000
heap
page read and write
CF8000
heap
page read and write
7FF6D8320000
unkown
page readonly
D1D000
heap
page read and write
DBF000
heap
page read and write
16BF000
heap
page read and write
D69000
heap
page read and write
C3B000
heap
page read and write
13FD000
heap
page read and write
F19000
heap
page read and write
DD8000
heap
page read and write
2A3F000
heap
page read and write
17E1000
heap
page read and write
5F30000
heap
page read and write
2686000
trusted library allocation
page read and write
D0B000
heap
page read and write
D07000
heap
page read and write
16E5000
heap
page read and write
1703000
heap
page read and write
17E1000
heap
page read and write
17D4000
heap
page read and write
AD9000
heap
page read and write
C24000
heap
page read and write
1048000
heap
page read and write
17C5000
heap
page read and write
E0F000
heap
page read and write
F46000
heap
page read and write
2C7D000
heap
page read and write
DFC000
heap
page read and write
4181000
heap
page read and write
17E1000
heap
page read and write
2A34000
heap
page read and write
DAE000
heap
page read and write
E0F000
heap
page read and write
DA0000
heap
page read and write
DD8000
heap
page read and write
D0C000
heap
page read and write
BF1000
heap
page read and write
16BF000
heap
page read and write
D85000
heap
page read and write
29FC000
heap
page read and write
CF7000
heap
page read and write
17C0000
heap
page read and write
DA8000
heap
page read and write
CE8000
heap
page read and write
2C81000
heap
page read and write
C16000
heap
page read and write
DB7000
heap
page read and write
17B0000
heap
page read and write
CE8000
heap
page read and write
BD9000
heap
page read and write
16B3000
heap
page read and write
17C0000
heap
page read and write
1586000
heap
page read and write
1035000
heap
page read and write
1278000
heap
page read and write
AD9000
heap
page read and write
D0C000
heap
page read and write
CF7000
heap
page read and write
DD8000
heap
page read and write
2686000
trusted library allocation
page read and write
C10000
heap
page read and write
C28000
heap
page read and write
66702000
unkown
page execute
11AD000
heap
page read and write
17E1000
heap
page read and write
169C000
heap
page read and write
666F7000
unkown
page read and write
AAD000
heap
page read and write
169D000
heap
page read and write
E0F000
heap
page read and write
CEC000
heap
page read and write
DA8000
heap
page read and write
17C0000
heap
page read and write
E0B000
heap
page read and write
BCD000
heap
page read and write
17D0000
heap
page read and write
D41000
heap
page read and write
DFC000
heap
page read and write
11BA000
heap
page read and write
17C6000
heap
page read and write
D85000
heap
page read and write
DFC000
heap
page read and write
2A1E000
heap
page read and write
17E1000
heap
page read and write
C68000
heap
page read and write
13A1000
heap
page read and write
1303000
heap
page read and write
BDD000
heap
page read and write
17C6000
heap
page read and write
29FC000
heap
page read and write
17DC000
heap
page read and write
AC5000
heap
page read and write
C24000
heap
page read and write
17C3000
heap
page read and write
CE8000
heap
page read and write
2A3F000
heap
page read and write
E0B000
heap
page read and write
1611000
heap
page read and write
2A37000
heap
page read and write
D26000
heap
page read and write
1703000
heap
page read and write
E0F000
heap
page read and write
4DD7000
heap
page read and write
17E1000
heap
page read and write
C32000
heap
page read and write
F09000
heap
page read and write
16E5000
heap
page read and write
C0D000
heap
page read and write
DAB000
heap
page read and write
D1D000
heap
page read and write
DD8000
heap
page read and write
17B0000
heap
page read and write
2680000
trusted library allocation
page read and write
16A0000
heap
page read and write
4FA6000
heap
page read and write
ABD000
heap
page read and write
A82000
heap
page read and write
1048000
heap
page read and write
ABD000
heap
page read and write
7FF6D834F000
unkown
page readonly
ABE000
heap
page read and write
2A0E000
heap
page read and write
1439000
heap
page read and write
DEC000
heap
page read and write
D07000
heap
page read and write
DB1000
heap
page read and write
16E5000
heap
page read and write
17C3000
heap
page read and write
BF5000
heap
page read and write
D4A000
heap
page read and write
16EF000
heap
page read and write
7FF6D8351000
unkown
page readonly
C16000
heap
page read and write
F2C000
heap
page read and write
17C0000
heap
page read and write
2A30000
heap
page read and write
C3B000
heap
page read and write
D0C000
heap
page read and write
D24000
heap
page read and write
A93000
heap
page read and write
AD9000
heap
page read and write
2A2A000
heap
page read and write
17C6000
heap
page read and write
17D4000
heap
page read and write
C05000
heap
page read and write
17C1000
heap
page read and write
C24000
heap
page read and write
16A0000
heap
page read and write
C16000
heap
page read and write
DEC000
heap
page read and write
2A30000
heap
page read and write
D69000
heap
page read and write
17B0000
heap
page read and write
16EF000
heap
page read and write
D24000
heap
page read and write
17B0000
heap
page read and write
E0F000
heap
page read and write
2C88000
heap
page read and write
1592000
heap
page read and write
2A23000
heap
page read and write
D24000
heap
page read and write
DFC000
heap
page read and write
D07000
heap
page read and write
1654000
heap
page read and write
DAF000
heap
page read and write
D24000
heap
page read and write
66640000
unkown
page readonly
D24000
heap
page read and write
D1D000
heap
page read and write
DB0000
heap
page read and write
D24000
heap
page read and write
E0B000
heap
page read and write
2A3F000
heap
page read and write
F44000
heap
page read and write
DCB000
heap
page read and write
17C3000
heap
page read and write
F28000
heap
page read and write
E0F000
heap
page read and write
7FF6D8320000
unkown
page readonly
163E000
heap
page read and write
970000
heap
page read and write
DAD000
heap
page read and write
F3E000
heap
page read and write
F3E000
heap
page read and write
16B4000
heap
page read and write
D24000
heap
page read and write
DFC000
heap
page read and write
166C000
heap
page read and write
AD9000
heap
page read and write
BE6000
heap
page read and write
119D000
heap
page read and write
11DF000
heap
page read and write
17E1000
heap
page read and write
AD9000
heap
page read and write
DFC000
heap
page read and write
C16000
heap
page read and write
F3E000
heap
page read and write
17DC000
heap
page read and write
17C6000
heap
page read and write
BDD000
heap
page read and write
1048000
heap
page read and write
D17000
heap
page read and write
17D0000
heap
page read and write
C01000
heap
page read and write
17D4000
heap
page read and write
4E28000
heap
page read and write
11AD000
heap
page read and write
C16000
heap
page read and write
11BC000
heap
page read and write
11B6000
heap
page read and write
17D0000
heap
page read and write
509A000
heap
page read and write
D07000
heap
page read and write
17B0000
heap
page read and write
C01000
heap
page read and write
DBC000
heap
page read and write
C16000
heap
page read and write
BF1000
heap
page read and write
66640000
unkown
page readonly
1048000
heap
page read and write
16A0000
heap
page read and write
1279000
heap
page read and write
1703000
heap
page read and write
DEC000
heap
page read and write
14F1000
heap
page read and write
C16000
heap
page read and write
BF1000
heap
page read and write
F18000
heap
page read and write
F20000
heap
page read and write
E0F000
heap
page read and write
BF1000
heap
page read and write
AD1000
heap
page read and write
ED4000
heap
page read and write
17DC000
heap
page read and write
17D4000
heap
page read and write
14F1000
heap
page read and write
17D0000
heap
page read and write
C3B000
heap
page read and write
17C0000
heap
page read and write
F38000
heap
page read and write
BE1000
heap
page read and write
17E1000
heap
page read and write
1172000
heap
page read and write
F46000
heap
page read and write
C3B000
heap
page read and write
2A22000
heap
page read and write
C16000
heap
page read and write
F19000
heap
page read and write
1048000
heap
page read and write
17DC000
heap
page read and write
D13000
heap
page read and write
C24000
heap
page read and write
E0F000
heap
page read and write
CFE000
heap
page read and write
C24000
heap
page read and write
C0D000
heap
page read and write
DC3000
heap
page read and write
C3C000
heap
page read and write
DAD000
heap
page read and write
AC5000
heap
page read and write
DEC000
heap
page read and write
17B0000
heap
page read and write
DD1000
heap
page read and write
11A1000
heap
page read and write
DAE000
heap
page read and write
DC3000
heap
page read and write
D85000
heap
page read and write
DC4000
heap
page read and write
17E1000
heap
page read and write
D13000
heap
page read and write
1864000
heap
page read and write
CE8000
heap
page read and write
D0C000
heap
page read and write
F46000
heap
page read and write
DB7000
heap
page read and write
C2C000
heap
page read and write
CFB000
heap
page read and write
F44000
heap
page read and write
11C2000
heap
page read and write
17C5000
heap
page read and write
17E1000
heap
page read and write
DFC000
heap
page read and write
11AD000
heap
page read and write
2A33000
heap
page read and write
F1E000
heap
page read and write
1302000
heap
page read and write
17DC000
heap
page read and write
1181000
heap
page read and write
AA1000
heap
page read and write
17E1000
heap
page read and write
AD9000
heap
page read and write
1048000
heap
page read and write
2A34000
heap
page read and write
AA2000
heap
page read and write
16CF000
heap
page read and write
2A0E000
heap
page read and write
C0D000
heap
page read and write
BFD000
heap
page read and write
AD9000
heap
page read and write
424C000
heap
page read and write
139E000
heap
page read and write
C24000
heap
page read and write
17E1000
heap
page read and write
E0F000
heap
page read and write
16A1000
heap
page read and write
1181000
heap
page read and write
D0C000
heap
page read and write
17D0000
heap
page read and write
118D000
heap
page read and write
17B0000
heap
page read and write
BF2000
heap
page read and write
3FAA000
heap
page read and write
F3D000
heap
page read and write
E0F000
heap
page read and write
1565000
heap
page read and write
1662000
heap
page read and write
DD8000
heap
page read and write
CFB000
heap
page read and write
17E1000
heap
page read and write
DBF000
heap
page read and write
C05000
heap
page read and write
17E1000
heap
page read and write
F34000
heap
page read and write
1632000
heap
page read and write
2A3F000
heap
page read and write
16A0000
heap
page read and write
C0D000
heap
page read and write
17E1000
heap
page read and write
F44000
heap
page read and write
C3B000
heap
page read and write
11AD000
heap
page read and write
17C0000
heap
page read and write
4C7F000
heap
page read and write
29EC000
heap
page read and write
1166000
heap
page read and write
493000
heap
page read and write
1425000
heap
page read and write
17C6000
heap
page read and write
C16000
heap
page read and write
17E1000
heap
page read and write
D10000
heap
page read and write
D85000
heap
page read and write
C3B000
heap
page read and write
F1B000
heap
page read and write
17D4000
heap
page read and write
C3B000
heap
page read and write
AC5000
heap
page read and write
F34000
heap
page read and write
C40000
heap
page read and write
D79000
heap
page read and write
D0C000
heap
page read and write
17E1000
heap
page read and write
16A0000
heap
page read and write
2A00000
heap
page read and write
C11000
heap
page read and write
A83000
heap
page read and write
2C54000
heap
page read and write
D24000
heap
page read and write
C0D000
heap
page read and write
F0A000
heap
page read and write
1980000
heap
page read and write
C27000
heap
page read and write
17C0000
heap
page read and write
DFC000
heap
page read and write
17C3000
heap
page read and write
D90000
heap
page read and write
7FF6D8351000
unkown
page readonly
15AE000
heap
page read and write
DBC000
heap
page read and write
17E1000
heap
page read and write
D0C000
heap
page read and write
1390000
heap
page read and write
29FF000
heap
page read and write
401000
unkown
page execute read
AD9000
heap
page read and write
17D4000
heap
page read and write
C16000
heap
page read and write
1349000
heap
page read and write
BF6000
heap
page read and write
66706000
unkown
page readonly
13CF000
heap
page read and write
F46000
heap
page read and write
D41000
heap
page read and write
143F000
heap
page read and write
1B0000
heap
page read and write
AC5000
heap
page read and write
119E000
heap
page read and write
17C3000
heap
page read and write
AAE000
heap
page read and write
1053000
heap
page read and write
17C3000
heap
page read and write
AD9000
heap
page read and write
17C0000
heap
page read and write
C0D000
heap
page read and write
17B0000
heap
page read and write
DB3000
heap
page read and write
17B0000
heap
page read and write
17C5000
heap
page read and write
F3E000
heap
page read and write
164B000
heap
page read and write
C24000
heap
page read and write
17B0000
heap
page read and write
29FF000
heap
page read and write
690000
heap
page read and write
11A2000
heap
page read and write
7FF6D8321000
unkown
page execute read
2A3F000
heap
page read and write
26CF000
trusted library allocation
page read and write
D2F000
heap
page read and write
C16000
heap
page read and write
17C6000
heap
page read and write
17E1000
heap
page read and write
17D4000
heap
page read and write
CE8000
heap
page read and write
143F000
heap
page read and write
17C3000
heap
page read and write
A92000
heap
page read and write
F34000
heap
page read and write
DFC000
heap
page read and write
11BC000
heap
page read and write
E0F000
heap
page read and write
F34000
heap
page read and write
1048000
heap
page read and write
17DC000
heap
page read and write
D69000
heap
page read and write
DEC000
heap
page read and write
1048000
heap
page read and write
4DAF000
heap
page read and write
DEC000
heap
page read and write
414000
unkown
page readonly
DD1000
heap
page read and write
CF7000
heap
page read and write
D10000
heap
page read and write
1703000
heap
page read and write
ABD000
heap
page read and write
7FF6D8342000
unkown
page readonly
17C0000
heap
page read and write
DD1000
heap
page read and write
17D4000
heap
page read and write
F19000
heap
page read and write
16BF000
heap
page read and write
66702000
unkown
page execute
5E33000
heap
page read and write
DD1000
heap
page read and write
17C0000
heap
page read and write
1048000
heap
page read and write
2A15000
heap
page read and write
119D000
heap
page read and write
16EF000
heap
page read and write
2990000
heap
page read and write
F0C000
heap
page read and write
16BF000
heap
page read and write
DBC000
heap
page read and write
1048000
heap
page read and write
DD1000
heap
page read and write
AD9000
heap
page read and write
E0F000
heap
page read and write
E0F000
heap
page read and write
C0D000
heap
page read and write
17B0000
heap
page read and write
A92000
heap
page read and write
D13000
heap
page read and write
A3E000
heap
page read and write
1034000
heap
page read and write
F1B000
heap
page read and write
2AA7000
heap
page read and write
DEC000
heap
page read and write
AC5000
heap
page read and write
A83000
heap
page read and write
BDE000
heap
page read and write
AA2000
heap
page read and write
66641000
unkown
page execute read
F19000
heap
page read and write
F3C000
heap
page read and write
177E000
heap
page read and write
DFC000
heap
page read and write
46B000
unkown
page readonly
DD1000
heap
page read and write
E0F000
heap
page read and write
BC8000
heap
page read and write
F1E000
heap
page read and write
D69000
heap
page read and write
CF2000
heap
page read and write
17B0000
heap
page read and write
E0F000
heap
page read and write
BFD000
heap
page read and write
17C0000
heap
page read and write
2520000
trusted library allocation
page read and write
D17000
heap
page read and write
2310000
trusted library allocation
page read and write
18B3000
heap
page read and write
ABD000
heap
page read and write
17B0000
heap
page read and write
A92000
heap
page read and write
BF2000
heap
page read and write
BE1000
heap
page read and write
DEC000
heap
page read and write
DA8000
heap
page read and write
CE8000
heap
page read and write
DEC000
heap
page read and write
DA8000
heap
page read and write
17E1000
heap
page read and write
C68000
heap
page read and write
DC3000
heap
page read and write
17E1000
heap
page read and write
DB7000
heap
page read and write
17E1000
heap
page read and write
16A0000
heap
page read and write
17C6000
heap
page read and write
11BA000
heap
page read and write
BB4000
heap
page read and write
2686000
trusted library allocation
page read and write
C3B000
heap
page read and write
E0B000
heap
page read and write
2C81000
heap
page read and write
DAD000
heap
page read and write
ABD000
heap
page read and write
DC4000
heap
page read and write
F46000
heap
page read and write
D90000
heap
page read and write
17C5000
heap
page read and write
DCB000
heap
page read and write
AC5000
heap
page read and write
F34000
heap
page read and write
E0B000
heap
page read and write
D13000
heap
page read and write
11B1000
heap
page read and write
DC3000
heap
page read and write
DAD000
heap
page read and write
D28000
heap
page read and write
17B0000
heap
page read and write
4CF0000
heap
page read and write
17B0000
heap
page read and write
F2C000
heap
page read and write
ACA000
heap
page read and write
17E1000
heap
page read and write
17C0000
heap
page read and write
17C6000
heap
page read and write
17D4000
heap
page read and write
17D0000
heap
page read and write
E72000
heap
page read and write
D24000
heap
page read and write
169D000
heap
page read and write
11BA000
heap
page read and write
C28000
heap
page read and write
C24000
heap
page read and write
7FF6D8320000
unkown
page readonly
DEC000
heap
page read and write
14BF000
heap
page read and write
AC5000
heap
page read and write
ABD000
heap
page read and write
14DD000
heap
page read and write
E0B000
heap
page read and write
A92000
heap
page read and write
F3E000
heap
page read and write
7FF6D8342000
unkown
page readonly
C3B000
heap
page read and write
17C5000
heap
page read and write
29FC000
heap
page read and write
E0B000
heap
page read and write
C05000
heap
page read and write
DD8000
heap
page read and write
C24000
heap
page read and write
AAE000
heap
page read and write
F46000
heap
page read and write
AA6000
heap
page read and write
D17000
heap
page read and write
D69000
heap
page read and write
17C6000
heap
page read and write
D69000
heap
page read and write
F28000
heap
page read and write
11B6000
heap
page read and write
ABD000
heap
page read and write
2A30000
heap
page read and write
17E1000
heap
page read and write
D0C000
heap
page read and write
C16000
heap
page read and write
D52000
heap
page read and write
150E000
heap
page read and write
17C0000
heap
page read and write
1600000
heap
page read and write
DEC000
heap
page read and write
1761000
heap
page read and write
C0D000
heap
page read and write
D24000
heap
page read and write
DEC000
heap
page read and write
66641000
unkown
page execute read
7FF6D8351000
unkown
page readonly
DBC000
heap
page read and write
17E1000
heap
page read and write
17B0000
heap
page read and write
F09000
heap
page read and write
7FF6D8320000
unkown
page readonly
C90000
heap
page read and write
F46000
heap
page read and write
1048000
heap
page read and write
1BEA000
heap
page read and write
DBC000
heap
page read and write
C16000
heap
page read and write
F18000
heap
page read and write
E0F000
heap
page read and write
17E1000
heap
page read and write
DEC000
heap
page read and write
1035000
heap
page read and write
AD9000
heap
page read and write
17C5000
heap
page read and write
DFC000
heap
page read and write
2C7D000
heap
page read and write
17E1000
heap
page read and write
52F1000
heap
page read and write
F3D000
heap
page read and write
1565000
heap
page read and write
17D4000
heap
page read and write
F46000
heap
page read and write
C05000
heap
page read and write
16A0000
heap
page read and write
169D000
heap
page read and write
11D7000
heap
page read and write
56D000
heap
page read and write
11B3000
heap
page read and write
DBC000
heap
page read and write
F18000
heap
page read and write
26CF000
trusted library allocation
page read and write
17C6000
heap
page read and write
162F000
heap
page read and write
D45000
heap
page read and write
41BC000
heap
page read and write
1048000
heap
page read and write
DD8000
heap
page read and write
1852000
heap
page read and write
11AD000
heap
page read and write
11BC000
heap
page read and write
C16000
heap
page read and write
13D2000
heap
page read and write
DFC000
heap
page read and write
16A1000
heap
page read and write
D39000
heap
page read and write
2A3F000
heap
page read and write
F46000
heap
page read and write
17D4000
heap
page read and write
17E1000
heap
page read and write
1048000
heap
page read and write
DD1000
heap
page read and write
98D000
heap
page read and write
17C6000
heap
page read and write
D24000
heap
page read and write
17C3000
heap
page read and write
182A000
heap
page read and write
169D000
heap
page read and write
DFC000
heap
page read and write
F18000
heap
page read and write
17E1000
heap
page read and write
7FF6D834D000
unkown
page read and write
17E1000
heap
page read and write
17A2000
heap
page read and write
DEC000
heap
page read and write
D0C000
heap
page read and write
2A09000
heap
page read and write
167E000
heap
page read and write
17D0000
heap
page read and write
118D000
heap
page read and write
DEC000
heap
page read and write
11AD000
heap
page read and write
D07000
heap
page read and write
16A0000
heap
page read and write
DBC000
heap
page read and write
C24000
heap
page read and write
2A3D000
heap
page read and write
C16000
heap
page read and write
17E1000
heap
page read and write
D07000
heap
page read and write
17D4000
heap
page read and write
DB7000
heap
page read and write
11AD000
heap
page read and write
1662000
heap
page read and write
F28000
heap
page read and write
4E9C000
heap
page read and write
66640000
unkown
page readonly
D13000
heap
page read and write
CFD000
heap
page read and write
C24000
heap
page read and write
17C0000
heap
page read and write
17B0000
heap
page read and write
AC5000
heap
page read and write
DFC000
heap
page read and write
D0B000
heap
page read and write
16EF000
heap
page read and write
DD1000
heap
page read and write
D13000
heap
page read and write
BF5000
heap
page read and write
4CDC000
heap
page read and write
13D5000
heap
page read and write
D03000
heap
page read and write
7FF6D834D000
unkown
page read and write
17D0000
heap
page read and write
BCF000
heap
page read and write
17DC000
heap
page read and write
7FF6D8350000
unkown
page write copy
D24000
heap
page read and write
119D000
heap
page read and write
DAE000
heap
page read and write
D13000
heap
page read and write
F28000
heap
page read and write
17E1000
heap
page read and write
F44000
heap
page read and write
E0B000
heap
page read and write
DEC000
heap
page read and write
F28000
heap
page read and write
DDD000
heap
page read and write
17C3000
heap
page read and write
2686000
trusted library allocation
page read and write
DAB000
heap
page read and write
E0F000
heap
page read and write
CEC000
heap
page read and write
BE2000
heap
page read and write
CFE000
heap
page read and write
D69000
heap
page read and write
2A33000
heap
page read and write
16BF000
heap
page read and write
17C3000
heap
page read and write
D10000
heap
page read and write
DD1000
heap
page read and write
10E0000
heap
page read and write
D24000
heap
page read and write
AA6000
heap
page read and write
D71000
heap
page read and write
DB5000
heap
page read and write
17B0000
heap
page read and write
2C7D000
heap
page read and write
666F7000
unkown
page read and write
1659000
heap
page read and write
17D4000
heap
page read and write
ABD000
heap
page read and write
DCB000
heap
page read and write
DFC000
heap
page read and write
1598000
heap
page read and write
D85000
heap
page read and write
F46000
heap
page read and write
DBC000
heap
page read and write
DAF000
heap
page read and write
17E1000
heap
page read and write
E0B000
heap
page read and write
ECF000
stack
page read and write
102E000
heap
page read and write
C0D000
heap
page read and write
C24000
heap
page read and write
2A2A000
heap
page read and write
E0B000
heap
page read and write
D01000
heap
page read and write
BE2000
heap
page read and write
CF7000
heap
page read and write
17D4000
heap
page read and write
7FF6D8342000
unkown
page readonly
1BE5000
heap
page read and write
D35000
heap
page read and write
D34000
heap
page read and write
DD1000
heap
page read and write
16A1000
heap
page read and write
17C0000
heap
page read and write
A83000
heap
page read and write
17B0000
heap
page read and write
E0F000
heap
page read and write
17E1000
heap
page read and write
66706000
unkown
page readonly
CDE000
heap
page read and write
CE8000
heap
page read and write
17C5000
heap
page read and write
17C3000
heap
page read and write
17E1000
heap
page read and write
17B0000
heap
page read and write
AA5000
heap
page read and write
C48000
heap
page read and write
DD8000
heap
page read and write
F28000
heap
page read and write
E0F000
heap
page read and write
13E1000
heap
page read and write
11BC000
heap
page read and write
17E1000
heap
page read and write
30C9000
heap
page read and write
17E1000
heap
page read and write
CEC000
heap
page read and write
17DC000
heap
page read and write
1D0000
heap
page read and write
16E5000
heap
page read and write
DFC000
heap
page read and write
16E5000
heap
page read and write
C24000
heap
page read and write
1048000
heap
page read and write
17E1000
heap
page read and write
A67000
heap
page read and write
295C000
heap
page read and write
AC5000
heap
page read and write
16A0000
heap
page read and write
2A33000
heap
page read and write
DB0000
heap
page read and write
AD9000
heap
page read and write
F34000
heap
page read and write
17DC000
heap
page read and write
F2C000
heap
page read and write
F3E000
heap
page read and write
17DC000
heap
page read and write
17E1000
heap
page read and write
1048000
heap
page read and write
17D0000
heap
page read and write
AD9000
heap
page read and write
DB7000
heap
page read and write
17E1000
heap
page read and write
F3E000
heap
page read and write
5F61000
heap
page read and write
DD8000
heap
page read and write
BCF000
heap
page read and write
CE8000
heap
page read and write
29FF000
heap
page read and write
DC3000
heap
page read and write
7FF6D8320000
unkown
page readonly
17D4000
heap
page read and write
C24000
heap
page read and write
D24000
heap
page read and write
DD1000
heap
page read and write
17B0000
heap
page read and write
16A0000
heap
page read and write
F1B000
heap
page read and write
D07000
heap
page read and write
DB7000
heap
page read and write
2A37000
heap
page read and write
C2F000
heap
page read and write
17C5000
heap
page read and write
1642000
heap
page read and write
F3C000
heap
page read and write
1583000
heap
page read and write
1048000
heap
page read and write
157D000
heap
page read and write
DB7000
heap
page read and write
390000
heap
page read and write
1181000
heap
page read and write
AD9000
heap
page read and write
2A2A000
heap
page read and write
DA0000
heap
page read and write
D24000
heap
page read and write
AD9000
heap
page read and write
2A37000
heap
page read and write
E0F000
heap
page read and write
DC3000
heap
page read and write
17D0000
heap
page read and write
E0B000
heap
page read and write
17C0000
heap
page read and write
17B0000
heap
page read and write
1703000
heap
page read and write
137A000
heap
page read and write
16E5000
heap
page read and write
D24000
heap
page read and write
D13000
heap
page read and write
11AD000
heap
page read and write
ABD000
heap
page read and write
163A000
heap
page read and write
DFC000
heap
page read and write
17D4000
heap
page read and write
D28000
heap
page read and write
4DAF000
heap
page read and write
F1B000
heap
page read and write
17C6000
heap
page read and write
D13000
heap
page read and write
DC3000
heap
page read and write
1048000
heap
page read and write
C16000
heap
page read and write
11B6000
heap
page read and write
1425000
heap
page read and write
E0F000
heap
page read and write
102C000
heap
page read and write
D07000
heap
page read and write
17D4000
heap
page read and write
E0B000
heap
page read and write
ABD000
heap
page read and write
B54000
heap
page read and write
17C0000
heap
page read and write
D9F000
heap
page read and write
DD8000
heap
page read and write
D8F000
heap
page read and write
1048000
heap
page read and write
16A1000
heap
page read and write
95F000
heap
page read and write
CFE000
heap
page read and write
BFD000
heap
page read and write
BE7000
heap
page read and write
F46000
heap
page read and write
2A0E000
heap
page read and write
CF8000
heap
page read and write
17C0000
heap
page read and write
1358000
heap
page read and write
2A3F000
heap
page read and write
C3C000
heap
page read and write
DD1000
heap
page read and write
DEC000
heap
page read and write
A93000
heap
page read and write
C3B000
heap
page read and write
D26000
heap
page read and write
DD8000
heap
page read and write
C24000
heap
page read and write
DB1000
heap
page read and write
17DC000
heap
page read and write
D04000
heap
page read and write
ABD000
heap
page read and write
1048000
heap
page read and write
1048000
heap
page read and write
DBC000
heap
page read and write
D85000
heap
page read and write
1C0000
heap
page read and write
F19000
heap
page read and write
D13000
heap
page read and write
DEC000
heap
page read and write
C01000
heap
page read and write
14F5000
heap
page read and write
119E000
heap
page read and write
2A3A000
heap
page read and write
D90000
heap
page read and write
E0B000
heap
page read and write
1425000
heap
page read and write
DEC000
heap
page read and write
E0B000
heap
page read and write
F44000
heap
page read and write
16CF000
heap
page read and write
17C0000
heap
page read and write
DD8000
heap
page read and write
16CF000
heap
page read and write
1703000
heap
page read and write
C16000
heap
page read and write
BF1000
heap
page read and write
2A30000
heap
page read and write
D24000
heap
page read and write
D86000
heap
page read and write
BF4000
heap
page read and write
165A000
heap
page read and write
D76000
heap
page read and write
E0F000
heap
page read and write
458000
unkown
page write copy
2A30000
heap
page read and write
4F79000
heap
page read and write
DD1000
heap
page read and write
17B0000
heap
page read and write
DC3000
heap
page read and write
13A0000
heap
page read and write
B9B000
heap
page read and write
26DF000
heap
page read and write
D69000
heap
page read and write
D39000
heap
page read and write
C01000
heap
page read and write
A92000
heap
page read and write
C24000
heap
page read and write
C01000
heap
page read and write
CE8000
heap
page read and write
11BC000
heap
page read and write
2A38000
heap
page read and write
A93000
heap
page read and write
A30000
heap
page read and write
15E3000
heap
page read and write
E0F000
heap
page read and write
16A1000
heap
page read and write
17E1000
heap
page read and write
F19000
heap
page read and write
F34000
heap
page read and write
DD1000
heap
page read and write
DFC000
heap
page read and write
BF5000
heap
page read and write
17B0000
heap
page read and write
D69000
heap
page read and write
D13000
heap
page read and write
BF9000
heap
page read and write
D4E000
heap
page read and write
DFC000
heap
page read and write
F46000
heap
page read and write
D76000
heap
page read and write
D85000
heap
page read and write
C2C000
heap
page read and write
BF1000
heap
page read and write
17E1000
heap
page read and write
17D4000
heap
page read and write
17D0000
heap
page read and write
F0C000
heap
page read and write
17C3000
heap
page read and write
AC5000
heap
page read and write
17DC000
heap
page read and write
DFC000
heap
page read and write
2A3F000
heap
page read and write
66641000
unkown
page execute read
D03000
heap
page read and write
E0F000
heap
page read and write
138B000
heap
page read and write
C2C000
heap
page read and write
17D4000
heap
page read and write
11B6000
heap
page read and write
DC3000
heap
page read and write
DB7000
heap
page read and write
17B0000
heap
page read and write
DA8000
heap
page read and write
17D4000
heap
page read and write
F46000
heap
page read and write
E0F000
heap
page read and write
E0F000
heap
page read and write
1968000
heap
page read and write
17D4000
heap
page read and write
17B0000
heap
page read and write
17D4000
heap
page read and write
66640000
unkown
page readonly
C01000
heap
page read and write
D24000
heap
page read and write
C0D000
heap
page read and write
D07000
heap
page read and write
1053000
heap
page read and write
89E000
heap
page read and write
DD8000
heap
page read and write
BE7000
heap
page read and write
DFC000
heap
page read and write
1193000
heap
page read and write
BF1000
heap
page read and write
16A1000
heap
page read and write
F3E000
heap
page read and write
17C0000
heap
page read and write
F18000
heap
page read and write
17C0000
heap
page read and write
17E1000
heap
page read and write
DFC000
heap
page read and write
CF7000
heap
page read and write
F34000
heap
page read and write
D85000
heap
page read and write
C02000
heap
page read and write
11BA000
heap
page read and write
BE6000
heap
page read and write
DD8000
heap
page read and write
D24000
heap
page read and write
17DC000
heap
page read and write
2A3F000
heap
page read and write
CE8000
heap
page read and write
17D0000
heap
page read and write
F46000
heap
page read and write
17B0000
heap
page read and write
CE8000
heap
page read and write
F34000
heap
page read and write
E0F000
heap
page read and write
2A3F000
heap
page read and write
4BF5000
heap
page read and write
D07000
heap
page read and write
F28000
heap
page read and write
11B6000
heap
page read and write
17B0000
heap
page read and write
DD8000
heap
page read and write
17C0000
heap
page read and write
119D000
heap
page read and write
D07000
heap
page read and write
DCB000
heap
page read and write
C50000
heap
page read and write
29FC000
heap
page read and write
17D4000
heap
page read and write
BDE000
heap
page read and write
D85000
heap
page read and write
DB7000
heap
page read and write
C24000
heap
page read and write
DC3000
heap
page read and write
17D0000
heap
page read and write
C3B000
heap
page read and write
17D0000
heap
page read and write
E0F000
heap
page read and write
C58000
heap
page read and write
17E1000
heap
page read and write
17C5000
heap
page read and write
F18000
heap
page read and write
D07000
heap
page read and write
1192000
heap
page read and write
17DC000
heap
page read and write
7FF6D834F000
unkown
page readonly
EDF000
heap
page read and write
17E1000
heap
page read and write
17C0000
heap
page read and write
E0F000
heap
page read and write
C16000
heap
page read and write
17E1000
heap
page read and write
D24000
heap
page read and write
66702000
unkown
page execute
DD1000
heap
page read and write
1035000
heap
page read and write
16E5000
heap
page read and write
AD9000
heap
page read and write
F28000
heap
page read and write
17B0000
heap
page read and write
17B0000
heap
page read and write
17D0000
heap
page read and write
15DD000
heap
page read and write
DD8000
heap
page read and write
E0F000
heap
page read and write
F44000
heap
page read and write
DBC000
heap
page read and write
16A0000
heap
page read and write
140D000
heap
page read and write
41D000
unkown
page readonly
2686000
trusted library allocation
page read and write
1053000
heap
page read and write
17B0000
heap
page read and write
BF5000
heap
page read and write
F25000
heap
page read and write
ABD000
heap
page read and write
17C3000
heap
page read and write
16EF000
heap
page read and write
DFC000
heap
page read and write
17D4000
heap
page read and write
17B0000
heap
page read and write
17C0000
heap
page read and write
D0C000
heap
page read and write
F09000
heap
page read and write
DB7000
heap
page read and write
BC8000
heap
page read and write
DC3000
heap
page read and write
F3E000
heap
page read and write
D13000
heap
page read and write
1182000
heap
page read and write
11B6000
heap
page read and write
D24000
heap
page read and write
D2C000
heap
page read and write
AA2000
heap
page read and write
E0F000
heap
page read and write
1053000
heap
page read and write
D17000
heap
page read and write
103C000
heap
page read and write
DAB000
heap
page read and write
D1D000
heap
page read and write
D1D000
heap
page read and write
CF7000
heap
page read and write
1541000
heap
page read and write
2A30000
heap
page read and write
A92000
heap
page read and write
F18000
heap
page read and write
17DC000
heap
page read and write
C01000
heap
page read and write
BB4000
heap
page read and write
CFF000
heap
page read and write
1685000
heap
page read and write
11B6000
heap
page read and write
DFC000
heap
page read and write
16A1000
heap
page read and write
F46000
heap
page read and write
11A2000
heap
page read and write
2A38000
heap
page read and write
7FF6D8321000
unkown
page execute read
C2C000
heap
page read and write
C05000
heap
page read and write
16B3000
heap
page read and write
1191000
heap
page read and write
5E45000
heap
page read and write
5E5A000
heap
page read and write
17C0000
heap
page read and write
17E1000
heap
page read and write
16E5000
heap
page read and write
2C7D000
heap
page read and write
D4A000
heap
page read and write
17D0000
heap
page read and write
B44000
heap
page read and write
17C0000
heap
page read and write
EEF000
heap
page read and write
17E1000
heap
page read and write
BA3000
heap
page read and write
14D7000
heap
page read and write
17C0000
heap
page read and write
17D4000
heap
page read and write
D01000
heap
page read and write
D39000
heap
page read and write
BF1000
heap
page read and write
AAE000
heap
page read and write
2A3F000
heap
page read and write
16CF000
heap
page read and write
11BC000
heap
page read and write
16EF000
heap
page read and write
1048000
heap
page read and write
666F2000
unkown
page read and write
D52000
heap
page read and write
AD9000
heap
page read and write
F2C000
heap
page read and write
17E1000
heap
page read and write
2A33000
heap
page read and write
C0D000
heap
page read and write
ABD000
heap
page read and write
16CF000
heap
page read and write
16CF000
heap
page read and write
C0D000
heap
page read and write
1164000
heap
page read and write
F44000
heap
page read and write
17D0000
heap
page read and write
DB0000
heap
page read and write
17C3000
heap
page read and write
5562000
heap
page read and write
2A3F000
heap
page read and write
DEC000
heap
page read and write
DD1000
heap
page read and write
DD1000
heap
page read and write
2A2A000
heap
page read and write
F3D000
heap
page read and write
CDC000
heap
page read and write
17C3000
heap
page read and write
17E1000
heap
page read and write
165D000
heap
page read and write
17DC000
heap
page read and write
17DC000
heap
page read and write
DA1000
heap
page read and write
17C3000
heap
page read and write
17E1000
heap
page read and write
C0D000
heap
page read and write
BD3000
heap
page read and write
F46000
heap
page read and write
CF8000
heap
page read and write
BE2000
heap
page read and write
16A0000
heap
page read and write
1032000
heap
page read and write
F34000
heap
page read and write
AD9000
heap
page read and write
DC3000
heap
page read and write
DFC000
heap
page read and write
BDD000
heap
page read and write
D90000
heap
page read and write
571000
heap
page read and write
F46000
heap
page read and write
D0C000
heap
page read and write
AC5000
heap
page read and write
F3E000
heap
page read and write
C16000
heap
page read and write
BCD000
stack
page read and write
F19000
heap
page read and write
E0B000
heap
page read and write
AD9000
heap
page read and write
F04000
heap
page read and write
C01000
heap
page read and write
D13000
heap
page read and write
1586000
heap
page read and write
17E1000
heap
page read and write
DBC000
heap
page read and write
CE8000
heap
page read and write
401000
unkown
page execute read
2A30000
heap
page read and write
11BA000
heap
page read and write
1053000
heap
page read and write
5EA9000
heap
page read and write
C32000
heap
page read and write
D07000
heap
page read and write
2B84000
heap
page read and write
17C0000
heap
page read and write
AC5000
heap
page read and write
F2C000
heap
page read and write
17C3000
heap
page read and write
1662000
heap
page read and write
DEC000
heap
page read and write
1EE000
heap
page read and write
C58000
heap
page read and write
DB7000
heap
page read and write
C01000
heap
page read and write
D0C000
heap
page read and write
F46000
heap
page read and write
D7B000
heap
page read and write
666D1000
unkown
page readonly
DBF000
heap
page read and write
CF8000
heap
page read and write
CF7000
heap
page read and write
1035000
heap
page read and write
DB7000
heap
page read and write
DD1000
heap
page read and write
17CB000
heap
page read and write
16EF000
heap
page read and write
17B0000
heap
page read and write
DA8000
heap
page read and write
17C0000
heap
page read and write
AA6000
heap
page read and write
CE8000
heap
page read and write
DD8000
heap
page read and write
17E1000
heap
page read and write
16EF000
heap
page read and write
17E1000
heap
page read and write
DB5000
heap
page read and write
C01000
heap
page read and write
DFC000
heap
page read and write
C24000
heap
page read and write
A53000
heap
page read and write
BE2000
heap
page read and write
F3D000
heap
page read and write
ABD000
heap
page read and write
4E10000
heap
page read and write
D13000
heap
page read and write
B0F000
stack
page read and write
CE8000
heap
page read and write
C3B000
heap
page read and write
17D0000
heap
page read and write
DAD000
heap
page read and write
11BC000
heap
page read and write
AE3000
heap
page read and write
F18000
heap
page read and write
2A0E000
heap
page read and write
DFC000
heap
page read and write
DD8000
heap
page read and write
C01000
heap
page read and write
D69000
heap
page read and write
D65000
heap
page read and write
EFB000
heap
page read and write
2A3F000
heap
page read and write
C28000
heap
page read and write
DD8000
heap
page read and write
F46000
heap
page read and write
DC3000
heap
page read and write
BF1000
heap
page read and write
D69000
heap
page read and write
13E1000
heap
page read and write
1048000
heap
page read and write
16E5000
heap
page read and write
11BC000
heap
page read and write
DEC000
heap
page read and write
E10000
heap
page read and write
AE3000
heap
page read and write
E0B000
heap
page read and write
DA8000
heap
page read and write
17C6000
heap
page read and write
17C5000
heap
page read and write
AD9000
heap
page read and write
D24000
heap
page read and write
DA0000
heap
page read and write
F46000
heap
page read and write
BF1000
heap
page read and write
452C000
heap
page read and write
BC8000
heap
page read and write
17D4000
heap
page read and write
E0F000
heap
page read and write
CE8000
heap
page read and write
DD1000
heap
page read and write
F44000
heap
page read and write
7FF6D8321000
unkown
page execute read
5F0C000
heap
page read and write
DFC000
heap
page read and write
F28000
heap
page read and write
D9F000
heap
page read and write
17E1000
heap
page read and write
1E0000
heap
page read and write
17DC000
heap
page read and write
1779000
heap
page read and write
2A2A000
heap
page read and write
CE8000
heap
page read and write
12F0000
heap
page read and write
BF4000
heap
page read and write
17D0000
heap
page read and write
D24000
heap
page read and write
17D0000
heap
page read and write
F28000
heap
page read and write
13E1000
heap
page read and write
D85000
heap
page read and write
D57000
heap
page read and write
DFC000
heap
page read and write
C05000
heap
page read and write
AC0000
heap
page read and write
C28000
heap
page read and write
D0C000
heap
page read and write
D00000
heap
page read and write
F3E000
heap
page read and write
BDD000
heap
page read and write
C01000
heap
page read and write
F46000
heap
page read and write
17E1000
heap
page read and write
D1D000
heap
page read and write
CFB000
heap
page read and write
F3E000
heap
page read and write
2B4E000
heap
page read and write
D24000
heap
page read and write
17C0000
heap
page read and write
16AB000
heap
page read and write
DAF000
heap
page read and write
A35000
heap
page read and write
7FF6D834D000
unkown
page write copy
1048000
heap
page read and write
2A2A000
heap
page read and write
17DC000
heap
page read and write
DEC000
heap
page read and write
17C6000
heap
page read and write
158C000
heap
page read and write
CEC000
heap
page read and write
17CB000
heap
page read and write
1048000
heap
page read and write
C48000
heap
page read and write
17C0000
heap
page read and write
AAE000
heap
page read and write
C05000
heap
page read and write
D24000
heap
page read and write
17C0000
heap
page read and write
16A5000
heap
page read and write
F3E000
heap
page read and write
D69000
heap
page read and write
DAF000
heap
page read and write
BE9000
heap
page read and write
DFC000
heap
page read and write
D8F000
heap
page read and write
D00000
heap
page read and write
1182000
heap
page read and write
BE2000
heap
page read and write
17DC000
heap
page read and write
15E3000
heap
page read and write
16A0000
heap
page read and write
A92000
heap
page read and write
BF1000
heap
page read and write
11AD000
heap
page read and write
2A1E000
heap
page read and write
2A3D000
heap
page read and write
17C3000
heap
page read and write
DFC000
heap
page read and write
1580000
heap
page read and write
D85000
heap
page read and write
D0C000
heap
page read and write
BFD000
heap
page read and write
167C000
heap
page read and write
11BC000
heap
page read and write
DEC000
heap
page read and write
E0B000
heap
page read and write
DFC000
heap
page read and write
D85000
heap
page read and write
DA8000
heap
page read and write
D1D000
heap
page read and write
DB7000
heap
page read and write
D90000
heap
page read and write
DB0000
heap
page read and write
17C6000
heap
page read and write
29FC000
heap
page read and write
D85000
heap
page read and write
D13000
heap
page read and write
127B000
heap
page read and write
17DC000
heap
page read and write
17C5000
heap
page read and write
1120000
heap
page read and write
DD8000
heap
page read and write
DAD000
heap
page read and write
DD8000
heap
page read and write
1048000
heap
page read and write
17E1000
heap
page read and write
F2C000
heap
page read and write
DD8000
heap
page read and write
891000
heap
page read and write
169C000
heap
page read and write
17B0000
heap
page read and write
F19000
heap
page read and write
17C6000
heap
page read and write
1048000
heap
page read and write
A4C000
heap
page read and write
DC4000
heap
page read and write
1182000
heap
page read and write
D39000
heap
page read and write
D07000
heap
page read and write
AD9000
heap
page read and write
C3B000
heap
page read and write
F22000
heap
page read and write
1048000
heap
page read and write
A91000
heap
page read and write
17E1000
heap
page read and write
F34000
heap
page read and write
1048000
heap
page read and write
D79000
heap
page read and write
DEC000
heap
page read and write
F46000
heap
page read and write
BFD000
heap
page read and write
17D0000
heap
page read and write
2A30000
heap
page read and write
C24000
heap
page read and write
DED000
heap
page read and write
F18000
heap
page read and write
DD1000
heap
page read and write
DBC000
heap
page read and write
F2C000
heap
page read and write
E0B000
heap
page read and write
DB5000
heap
page read and write
BF1000
heap
page read and write
E0F000
heap
page read and write
17B0000
heap
page read and write
D51000
heap
page read and write
F1E000
heap
page read and write
DEC000
heap
page read and write
DD8000
heap
page read and write
CE8000
heap
page read and write
17C0000
heap
page read and write
CF7000
heap
page read and write
D10000
heap
page read and write
17E1000
heap
page read and write
F46000
heap
page read and write
E0F000
heap
page read and write
17C6000
heap
page read and write
AD9000
heap
page read and write
17C0000
heap
page read and write
BE2000
heap
page read and write
AD9000
heap
page read and write
10ED000
heap
page read and write
C16000
heap
page read and write
17C6000
heap
page read and write
ABD000
heap
page read and write
1048000
heap
page read and write
17D0000
heap
page read and write
1194000
heap
page read and write
C3B000
heap
page read and write
17DC000
heap
page read and write
F2C000
heap
page read and write
BFD000
heap
page read and write
F46000
heap
page read and write
D24000
heap
page read and write
17C0000
heap
page read and write
DA8000
heap
page read and write
17E1000
heap
page read and write
1182000
heap
page read and write
DB7000
heap
page read and write
F44000
heap
page read and write
17C5000
heap
page read and write
AA2000
heap
page read and write
1181000
heap
page read and write
F1E000
heap
page read and write
1703000
heap
page read and write
666F7000
unkown
page read and write
2C81000
heap
page read and write
DB3000
heap
page read and write
DB2000
heap
page read and write
E0F000
heap
page read and write
BF6000
heap
page read and write
CE8000
heap
page read and write
17E1000
heap
page read and write
17C6000
heap
page read and write
D79000
heap
page read and write
17C3000
heap
page read and write
11C4000
heap
page read and write
2A37000
heap
page read and write
D85000
heap
page read and write
16BF000
heap
page read and write
26EB000
heap
page read and write
17E1000
heap
page read and write
F3D000
heap
page read and write
16CF000
heap
page read and write
11AD000
heap
page read and write
AD9000
heap
page read and write
F2C000
heap
page read and write
11A1000
heap
page read and write
17C3000
heap
page read and write
16E5000
heap
page read and write
BF4000
heap
page read and write
C16000
heap
page read and write
F44000
heap
page read and write
DEC000
heap
page read and write
C3B000
heap
page read and write
6B36000
heap
page read and write
139A000
heap
page read and write
17B0000
heap
page read and write
E0F000
heap
page read and write
17D0000
heap
page read and write
D81000
heap
page read and write
16AB000
heap
page read and write
17C0000
heap
page read and write
DFC000
heap
page read and write
A92000
heap
page read and write
16E5000
heap
page read and write
7FF6D8351000
unkown
page readonly
BE2000
heap
page read and write
C3B000
heap
page read and write
E0F000
heap
page read and write
E0F000
heap
page read and write
C3B000
heap
page read and write
CEC000
heap
page read and write
DEC000
heap
page read and write
2A30000
heap
page read and write
F44000
heap
page read and write
D85000
heap
page read and write
F3C000
heap
page read and write
D0C000
heap
page read and write
E0F000
heap
page read and write
1053000
heap
page read and write
17E1000
heap
page read and write
17D0000
heap
page read and write
DA8000
heap
page read and write
F34000
heap
page read and write
DD8000
heap
page read and write
42A5000
heap
page read and write
1048000
heap
page read and write
1048000
heap
page read and write
29FC000
heap
page read and write
DC3000
heap
page read and write
17C0000
heap
page read and write
7FF6D834D000
unkown
page write copy
17C5000
heap
page read and write
102E000
heap
page read and write
D39000
heap
page read and write
CE8000
heap
page read and write
C2A000
heap
page read and write
17C0000
heap
page read and write
D9F000
heap
page read and write
DC3000
heap
page read and write
D24000
heap
page read and write
CE8000
heap
page read and write
DCD000
heap
page read and write
66641000
unkown
page execute read
AD9000
heap
page read and write
29D1000
heap
page read and write
16A1000
heap
page read and write
2A1B000
heap
page read and write
17D4000
heap
page read and write
138D000
heap
page read and write
5361000
heap
page read and write
7FF6D8342000
unkown
page readonly
1048000
heap
page read and write
BF1000
heap
page read and write
BD3000
heap
page read and write
C35000
heap
page read and write
F28000
heap
page read and write
BFD000
heap
page read and write
1632000
heap
page read and write
17E1000
heap
page read and write
17D0000
heap
page read and write
1425000
heap
page read and write
C01000
heap
page read and write
1E2D000
heap
page read and write
1703000
heap
page read and write
E0B000
heap
page read and write
4FC2000
heap
page read and write
BE2000
heap
page read and write
11DF000
heap
page read and write
1048000
heap
page read and write
DBC000
heap
page read and write
CE8000
heap
page read and write
2A3F000
heap
page read and write
F28000
heap
page read and write
ABD000
heap
page read and write
CFB000
heap
page read and write
17D0000
heap
page read and write
F0C000
heap
page read and write
DEC000
heap
page read and write
666F2000
unkown
page read and write
C37000
heap
page read and write
17D4000
heap
page read and write
C58000
heap
page read and write
A92000
heap
page read and write
DB6000
heap
page read and write
F1E000
heap
page read and write
116D000
heap
page read and write
17E1000
heap
page read and write
AA1000
heap
page read and write
17C6000
heap
page read and write
DED000
heap
page read and write
17D4000
heap
page read and write
D24000
heap
page read and write
F2C000
heap
page read and write
1598000
heap
page read and write
BE2000
heap
page read and write
2A18000
heap
page read and write
7FF6D8342000
unkown
page readonly
17D0000
heap
page read and write
16CF000
heap
page read and write
E0F000
heap
page read and write
1598000
heap
page read and write
1024000
heap
page read and write
7FF6D8351000
unkown
page readonly
C49000
heap
page read and write
D0C000
heap
page read and write
D69000
heap
page read and write
1028000
heap
page read and write
DC3000
heap
page read and write
2950000
heap
page read and write
E0F000
heap
page read and write
2686000
trusted library allocation
page read and write
DB7000
heap
page read and write
DEC000
heap
page read and write
AA2000
heap
page read and write
D0C000
heap
page read and write
AAE000
heap
page read and write
17C0000
heap
page read and write
11D3000
heap
page read and write
17E1000
heap
page read and write
C05000
heap
page read and write
7FF6D834F000
unkown
page readonly
1048000
heap
page read and write
ED0000
heap
page read and write
BFD000
heap
page read and write
DD8000
heap
page read and write
666F4000
unkown
page write copy
DA0000
heap
page read and write
119D000
heap
page read and write
2A1E000
heap
page read and write
2A2A000
heap
page read and write
BF1000
heap
page read and write
17C6000
heap
page read and write
D35000
heap
page read and write
DD1000
heap
page read and write
2520000
trusted library allocation
page read and write
11DF000
heap
page read and write
AA2000
heap
page read and write
17C5000
heap
page read and write
2C7D000
heap
page read and write
F46000
heap
page read and write
1425000
heap
page read and write
2C7D000
heap
page read and write
ABD000
heap
page read and write
C0D000
heap
page read and write
C3B000
heap
page read and write
DB7000
heap
page read and write
1048000
heap
page read and write
17B0000
heap
page read and write
16B3000
heap
page read and write
16CF000
heap
page read and write
C01000
heap
page read and write
DCB000
heap
page read and write
2A1D000
heap
page read and write
1369000
heap
page read and write
2C19000
heap
page read and write
C01000
heap
page read and write
C2F000
heap
page read and write
7FF6D8321000
unkown
page execute read
DBC000
heap
page read and write
17E1000
heap
page read and write
5E10000
heap
page read and write
66706000
unkown
page readonly
DFC000
heap
page read and write
D10000
heap
page read and write
F3C000
heap
page read and write
17C3000
heap
page read and write
ACA000
heap
page read and write
BF6000
heap
page read and write
1703000
heap
page read and write
F46000
heap
page read and write
1771000
heap
page read and write
D10000
heap
page read and write
E0B000
heap
page read and write
1BE3000
heap
page read and write
AA2000
heap
page read and write
F28000
heap
page read and write
CFB000
heap
page read and write
DEC000
heap
page read and write
ABD000
heap
page read and write
E0F000
heap
page read and write
C05000
heap
page read and write
17B0000
heap
page read and write
DB8000
heap
page read and write
17E1000
heap
page read and write
D85000
heap
page read and write
11BC000
heap
page read and write
D1D000
heap
page read and write
C01000
heap
page read and write
D0C000
heap
page read and write
1568000
heap
page read and write
17E1000
heap
page read and write
D69000
heap
page read and write
17C5000
heap
page read and write
93F000
heap
page read and write
17D4000
heap
page read and write
29FC000
heap
page read and write
17C1000
heap
page read and write
F18000
heap
page read and write
1D89000
heap
page read and write
D69000
heap
page read and write
1EA000
heap
page read and write
16BF000
heap
page read and write
17E1000
heap
page read and write
DAD000
heap
page read and write
E0F000
heap
page read and write
2CAD000
heap
page read and write
1029000
heap
page read and write
C16000
heap
page read and write
17C3000
heap
page read and write
BF6000
heap
page read and write
1048000
heap
page read and write
E0F000
heap
page read and write
17E1000
heap
page read and write
17DC000
heap
page read and write
15E3000
heap
page read and write
2A3F000
heap
page read and write
DBC000
heap
page read and write
DFC000
heap
page read and write
AD9000
heap
page read and write
DA8000
heap
page read and write
F3E000
heap
page read and write
7FF6D8350000
unkown
page write copy
2A08000
heap
page read and write
C58000
heap
page read and write
17D0000
heap
page read and write
DED000
heap
page read and write
CE8000
heap
page read and write
1048000
heap
page read and write
16A0000
heap
page read and write
C05000
heap
page read and write
26CF000
trusted library allocation
page read and write
17D0000
heap
page read and write
17D4000
heap
page read and write
17CB000
heap
page read and write
EE0000
heap
page read and write
444000
unkown
page readonly
AC5000
heap
page read and write
F38000
heap
page read and write
AD9000
heap
page read and write
1048000
heap
page read and write
BB4000
heap
page read and write
5236000
heap
page read and write
1425000
heap
page read and write
1303000
heap
page read and write
E0B000
heap
page read and write
16B3000
heap
page read and write
2C7D000
heap
page read and write
ED9000
heap
page read and write
17D0000
heap
page read and write
2686000
trusted library allocation
page read and write
D85000
heap
page read and write
A91000
heap
page read and write
F2C000
heap
page read and write
D0C000
heap
page read and write
17C5000
heap
page read and write
F34000
heap
page read and write
DD8000
heap
page read and write
17D0000
heap
page read and write
AD9000
heap
page read and write
11A1000
heap
page read and write
5F60000
heap
page read and write
DFC000
heap
page read and write
17E1000
heap
page read and write
F3E000
heap
page read and write
17E1000
heap
page read and write
17E1000
heap
page read and write
50E4000
heap
page read and write
F0C000
heap
page read and write
BE1000
heap
page read and write
AC5000
heap
page read and write
F18000
heap
page read and write
E0B000
heap
page read and write
AC5000
heap
page read and write
DA8000
heap
page read and write
17C0000
heap
page read and write
F23000
heap
page read and write
DEC000
heap
page read and write
D9F000
heap
page read and write
17D0000
heap
page read and write
1048000
heap
page read and write
11AD000
heap
page read and write
17B0000
heap
page read and write
17DC000
heap
page read and write
C28000
heap
page read and write
CDC000
heap
page read and write
AD9000
heap
page read and write
DC4000
heap
page read and write
DFC000
heap
page read and write
DDD000
heap
page read and write
BE2000
heap
page read and write
7FF6D834D000
unkown
page read and write
BF1000
heap
page read and write
F18000
heap
page read and write
16CF000
heap
page read and write
7FF6D8351000
unkown
page readonly
DD8000
heap
page read and write
16EF000
heap
page read and write
666F4000
unkown
page write copy
E0B000
heap
page read and write
17C0000
heap
page read and write
DD8000
heap
page read and write
C16000
heap
page read and write
DD8000
heap
page read and write
169D000
heap
page read and write
DC4000
heap
page read and write
182B000
heap
page read and write
DEC000
heap
page read and write
1685000
heap
page read and write
ABD000
heap
page read and write
2686000
trusted library allocation
page read and write
17D0000
heap
page read and write
E0F000
heap
page read and write
2C81000
heap
page read and write
DFC000
heap
page read and write
17D4000
heap
page read and write
116D000
heap
page read and write
E0F000
heap
page read and write
17E1000
heap
page read and write
169C000
heap
page read and write
CF8000
heap
page read and write
F3E000
heap
page read and write
E0F000
heap
page read and write
C16000
heap
page read and write
1632000
heap
page read and write
F38000
heap
page read and write
CE8000
heap
page read and write
16E5000
heap
page read and write
17D4000
heap
page read and write
DC4000
heap
page read and write
1185000
heap
page read and write
16BF000
heap
page read and write
1C5A000
heap
page read and write
11B3000
heap
page read and write
299C000
heap
page read and write
17D4000
heap
page read and write
17E1000
heap
page read and write
2A34000
heap
page read and write
F19000
heap
page read and write
F2C000
heap
page read and write
17C0000
heap
page read and write
AA5000
heap
page read and write
17E1000
heap
page read and write
F46000
heap
page read and write
ACE000
heap
page read and write
17C0000
heap
page read and write
F09000
heap
page read and write
17E1000
heap
page read and write
CF8000
heap
page read and write
BF6000
heap
page read and write
1053000
heap
page read and write
169C000
heap
page read and write
DFC000
heap
page read and write
14D2000
heap
page read and write
A95000
heap
page read and write
D24000
heap
page read and write
17E1000
heap
page read and write
C28000
heap
page read and write
11B6000
heap
page read and write
F0C000
heap
page read and write
ABD000
heap
page read and write
D24000
heap
page read and write
16BF000
heap
page read and write
CFC000
stack
page read and write
17C3000
heap
page read and write
DDD000
heap
page read and write
ABD000
heap
page read and write
D0C000
heap
page read and write
DFC000
heap
page read and write
9B9000
heap
page read and write
7FF6D834F000
unkown
page readonly
BF1000
heap
page read and write
D13000
heap
page read and write
17D0000
heap
page read and write
D1D000
heap
page read and write
DFC000
heap
page read and write
BE2000
heap
page read and write
BDD000
heap
page read and write
D24000
heap
page read and write
1592000
heap
page read and write
ECC000
heap
page read and write
AA2000
heap
page read and write
11BA000
heap
page read and write
D24000
heap
page read and write
C28000
heap
page read and write
780000
heap
page read and write
164B000
heap
page read and write
F34000
heap
page read and write
E0F000
heap
page read and write
D51000
heap
page read and write
DD8000
heap
page read and write
7FF6D8342000
unkown
page readonly
13A1000
heap
page read and write
F2C000
heap
page read and write
F46000
heap
page read and write
BF2000
heap
page read and write
C05000
heap
page read and write
127A000
heap
page read and write
E0F000
heap
page read and write
26CF000
trusted library allocation
page read and write
17B0000
heap
page read and write
DFC000
heap
page read and write
11BC000
heap
page read and write
F44000
heap
page read and write
AA6000
heap
page read and write
17D0000
heap
page read and write
1703000
heap
page read and write
D69000
heap
page read and write
2520000
trusted library allocation
page read and write
DD8000
heap
page read and write
12F1000
heap
page read and write
11E2000
heap
page read and write
There are 8288 hidden memdumps, click here to show them.