IOC Report
SecuriteInfo.com.Trojan.Siggen21.29401.13949.1657.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Siggen21.29401.13949.1657.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows32JRE-00084000053-complete\bin\Remote Support.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\Remote SupportWinLauncher.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\SimpleService.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\cadasuser.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\elev_mac
Mach-O universal binary with 3 architectures: [i386:\012- Mach-O i386 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_HEAP_EXECUTION>] [x86_64:Mach-O 64-bit x86_64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL>] [arm64:Mach-O 64-bit arm64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|PIE>]
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\elev_win.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\jwutils_win32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\jwutils_win64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\session_win.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\setsid
Mach-O universal binary with 3 architectures: [i386:\012- Mach-O i386 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_HEAP_EXECUTION>] [x86_64:Mach-O 64-bit x86_64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL>] [arm64:Mach-O 64-bit arm64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|PIE>]
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\shcad.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\shlinuxutil
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.2.0, stripped
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\shlinuxutil32arm
ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-armhf.so.3, for GNU/Linux 2.6.26, BuildID[sha1]=507685fb8feca3723270b8ae80547d48f9b62d70, stripped
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\shlinuxutil64
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.0, stripped
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\shlinuxutil64arm
ELF 64-bit LSB pie executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, for GNU/Linux 3.7.0, BuildID[sha1]=431f525625c5beb4fbfb109a08b2d73fdc6852ec, stripped
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\simplehelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\simplehelper64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\translations\en.txt
ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\utils_wnative_dxgi_intel-32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\utils_wnative_dxgi_intel-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\utils_wnative_intel-32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\utils_wnative_intel-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\utils_wnative_shpty_intel-32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\utils_wnative_shpty_intel-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\utils_wnative_winpty_intel-32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\utils_wnative_winpty_intel-64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\winpty-agent.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\winpty-agent64.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\JAWTAccessBridge-32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\JAWTAccessBridge.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\JavaAccessBridge-32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\JavaAccessBridge.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\WindowsAccessBridge-32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\WindowsAccessBridge.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\awt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\client\jvm.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\dt_shmem.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\dt_socket.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\fontmanager.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\freetype.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\hprof.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\instrument.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\j2pcsc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\j2pkcs11.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\jaas_nt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\java-rmi.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\java.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\java.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\javaw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\jawt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\jdwp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\jjs.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\jli.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\jpeg.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\jsdt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\jsound.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\jsoundds.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\lcms.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\management.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\mlib_image.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\net.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\nio.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\npt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\pack200.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\splashscreen.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\sunec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\sunmscapi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\verify.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\w2k_lsa_auth.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\windowslauncher.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\zip.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\JWrapper-Windows32JRE-version[1].txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\JWrapper-Windows32JRE-version[1].txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\JWrapper-Windows32JRE-version[2].txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\1164
data
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\5324
data
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\6224
data
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\744
data
dropped
C:\Users\user\AppData\Local\Temp\imageio3054662377630072904.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio476293772189419094.tmp
PNG image data, 4 x 18, 8-bit grayscale, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio482841843346975126.tmp
PNG image data, 4 x 18, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio5556686099353411983.tmp
PNG image data, 10 x 18, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio8713817684022300584.tmp
PNG image data, 4 x 18, 8-bit grayscale, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio9164044487126480897.tmp
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio916517826857042589.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\DetectedProxies
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\ProxyCredentials
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\basicinfo
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\branding\helpUtkfastUcomG80\applet_splash.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\branding\helpUtkfastUcomG80\applet_splash@2x.png
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\branding\helpUtkfastUcomG80\branding.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\ChosenLanguage
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\JRE-LastSuccessfulOptions-JWrapper-Windows32JRE-00084000053-complete
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\JreNameOverride
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\JreNameOverride.afos_complete (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\JreNameOverride.afos_interim
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\Remote_SupportICO.ico
MS Windows icon resource - 5 icons, 16x16, 32 bits/pixel, 24x24, 32 bits/pixel
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\JWrapper-Windows32JRE-version.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\unrestricted\JWLaunchProperties-4211958251-23
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\unrestricted\JWrapper-Remote Support-splash.png
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\unrestricted\jwLastRun
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\JWrapperUseJRE
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\unrestricted\JWLaunchProperties-1713608944217-1
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\unrestricted\jwLastRun
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows32JRE-00084000053-complete\bin\Session Elevation Helper
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows32JRE-00084000053-complete\unrestricted\jwLastRun
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAppNote-JWrapperJreCompatibilityApp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAppSpec-AutoTest
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAppSpec-JWrapperJreCompatibilityApp
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAppSpec-JWrapperMatchedVersionServerUnavailable
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAppSpec-JWrapper_Service_Management_App
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAppSpec-Remote_Support
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAuxiliaryArchive-Remote Support_linarmutils32
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAuxiliaryArchive-Remote Support_linarmutils64
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAuxiliaryArchive-Remote Support_linutils32
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAuxiliaryArchive-Remote Support_linutils64
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAuxiliaryArchive-Remote Support_macutils32
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAuxiliaryArchive-Remote Support_macutils64
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAuxiliaryArchive-Remote Support_macutilsarm
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAuxiliaryArchive-Remote Support_os_jwwin
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAuxiliaryArchive-Remote Support_winutils32
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWAuxiliaryArchive-Remote Support_winutils64
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWrapper-JWrapper-version.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWrapper-Remote Support-ICNS.icns
Mac OS X icon, 118432 bytes, "is32" type
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWrapper-Remote Support-UninstallerICO.icopng
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWrapper-Remote Support-splash.png
PNG image data, 352 x 72, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWrapper-Remote Support-version.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\JWrapperLaunch
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\customer-jar-with-dependencies.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\customer-jar-with-dependencies.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\fontconfig.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\jwAuthorPublicKey
ASCII text, with very long lines (1033), with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\jwBuildVersion
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\jwrapper_license
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\jwrapperlib\jwstandalone.jar
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\jwrapperlib\jwstandalonelaunch.jar
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libjwutils_linux32.so
ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, with debug_info, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libjwutils_linux32arm.so
ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, BuildID[sha1]=0d3184baadd25544b9ede9ac16431accd8ba85b7, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libjwutils_linux64.so
ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, with debug_info, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libjwutils_linux64arm.so
ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=4b97def7328c5ced5eaff796c3e6ba3ff532c45b, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libjwutils_macos.jnilib
Mach-O universal binary with 3 architectures: [x86_64:Mach-O 64-bit x86_64 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK|NO_REEXPORTED_DYLIBS>] [i386:Mach-O i386 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK|NO_REEXPORTED_DYLIBS>] [arm64:Mach-O 64-bit arm64 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK|NO_REEXPORTED_DYLIBS>]
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_lnative_base_arm-32.so
ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, BuildID[sha1]=24c49cfad556ec10a11ff1f76fa38837f11eedd4, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_lnative_base_arm-64.so
ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=b08c12adf7a6eecd96eea4500533b4d34bb63e7e, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_lnative_base_intel-32.so
ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=ea09cded1d8d1d6025689fce403d99330ccb7f20, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_lnative_base_intel-64.so
ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=7ce88aa9e4ad542ef7acb6308b4b39138a05905e, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_lnative_grab_arm-32.so
ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, BuildID[sha1]=7f15c3163e8d4f99f231f4376e7bdd2506d6dab4, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_lnative_grab_arm-64.so
ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=59062dd60176c81290899b73d214b2e79e23fa1d, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_lnative_grab_intel-32.so
ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=983af6c747bb1f6190a4784faa9972be761323a2, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_lnative_grab_intel-64.so
ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=d939c78b1a97fb52b3bdf9f1354ca0d209a25baf, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_lnative_wlgrab_arm-32.so
ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, BuildID[sha1]=89d29057f4380122032b0f58cd14fcbabc138d65, stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_lnative_wlgrab_arm-64.so
ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=1b22c3fd3aab5963a88d50dbe64e8ed98ac20398, stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_lnative_wlgrab_intel-32.so
ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=053f1bb5e7fd9862400c09b65450800fef1af96a, stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_lnative_wlgrab_intel-64.so
ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=7289b06ab84351098a1a9d22698830a3601537d1, stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_mnative_arm-64.jnilib
Mach-O 64-bit arm64 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_REEXPORTED_DYLIBS>
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_mnative_intel-32.jnilib
Mach-O i386 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_REEXPORTED_DYLIBS>
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_mnative_intel-64.jnilib
Mach-O 64-bit x86_64 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_REEXPORTED_DYLIBS>
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_mnative_lion_intel-32.jnilib
Mach-O i386 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_REEXPORTED_DYLIBS>
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\libutils_mnative_lion_intel-64.jnilib
Mach-O 64-bit x86_64 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_REEXPORTED_DYLIBS>
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\nativesplash.png
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\translations\da.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\translations\de.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\translations\es.txt
Unicode text, UTF-8 text, with very long lines (315)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\translations\fr.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\translations\it.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\translations\nl.txt
Unicode text, UTF-8 text, with very long lines (305)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\translations\pt.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\translations\sv.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\ASSEMBLY_EXCEPTION
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\CLASSPATH_EXCEPTION_NOTE
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\DISCLAIMER
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\THIRD_PARTY_README
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\Welcome.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\client\Xusage.txt
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\accessibility.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\calendars.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\charsets.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\charsets.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\classlist
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\cmm\CIEXYZ.pf
Microsoft color profile 2.3, type lcms, XYZ/XYZ-abst device by lcms, 784 bytes, 28-12-2006 18:07:22, no copyright tag "lcms XYZ identity"
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\cmm\GRAY.pf
Microsoft color profile 2.3, type lcms, GRAY/XYZ-mntr device by lcms, 556 bytes, 28-12-2006 18:07:22, no copyright tag "lcms gray virtual profile"
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\cmm\LINEAR_RGB.pf
ColorSync color profile 2.3, type lcms, RGB/XYZ-mntr device by lcms, 488 bytes, 28-3-2008 14:24:37, transparent, relative colorimetric "linear sRGB"
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\cmm\PYCC.pf
ColorSync color profile 4.0, type lcms, 3CLR/XYZ-spac device by lcms, 234080 bytes, 10-4-2008 10:24:22, transparent, relative colorimetric, 0xf0e75c55d21e4d8c MD5 'PYCC from PCD 045'
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\cmm\sRGB.pf
Microsoft color profile 2.3, type lcms, RGB/XYZ-mntr device by lcms, 6876 bytes, 28-12-2006 18:07:22, no copyright tag "sRGB built-in"
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\content-types.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\crs-agent.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\crs-agent.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\currency.data
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\access-bridge-32.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\access-bridge-32.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\access-bridge.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\access-bridge.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\cldrdata.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\cldrdata.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\jaccess.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\jaccess.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\legacy8ujsse.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\legacy8ujsse.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\meta-index
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\openjsse.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\openjsse.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\sunec.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\sunjce_provider.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\sunmscapi.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\sunmscapi.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\sunpkcs11.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\sunpkcs11.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\flavormap.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\fontconfig.bfc
raw G3 (Group 3) FAX
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\fontconfig.properties.src
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\hijrah-config-umalqura.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\i386\jvm.cfg
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\images\cursors\cursors.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\images\cursors\invalid32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\images\cursors\win32_CopyDrop32x32.gif
GIF image data, version 89a, 31 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\images\cursors\win32_CopyNoDrop32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\images\cursors\win32_LinkDrop32x32.gif
GIF image data, version 89a, 31 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\images\cursors\win32_LinkNoDrop32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\images\cursors\win32_MoveDrop32x32.gif
GIF image data, version 89a, 31 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\images\cursors\win32_MoveNoDrop32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\jce.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\jsse.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\jsse.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\jvm.hprof.txt
Algol 68 source, ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\logging.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\management-agent.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\management\jmxremote.access
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\management\jmxremote.password.template
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\management\management.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\management\snmp.acl.template
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\meta-index
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\net.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\psfont.properties.ja
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\psfontj2d.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\resources.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\rt.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\rt.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\security\blacklisted.certs
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\security\cacerts
Java KeyStore
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\security\java.policy
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\security\java.security
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\security\legacy8ujsse.security
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\security\openjsse.security
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\security\policy\limited\US_export_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\security\policy\limited\local_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\security\policy\unlimited\US_export_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\security\policy\unlimited\local_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\sound.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\tzdb.dat
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\tzmappings
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\readme.txt
ASCII text, with very long lines (347)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\release
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\logs\GenericUpdater-2024-04-20-12-29-02-450-pid0.log
ASCII text, with very long lines (318), with CRLF, CR, LF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\logs\Remote Support-Remote Support-2024-04-20-12-28-08-104-pid6224.log
ASCII text, with very long lines (1739), with CRLF, LF line terminators
modified
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\logs\Wrapper-2024-04-20-12-27-10-884.log
ASCII text, with very long lines (387), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
There are 250 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.29401.13949.1657.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen21.29401.13949.1657.exe"
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows32JRE-00084000053-complete\bin\Remote Support.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows32JRE-00084000053-complete\bin\Remote Support.exe" -cp "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" -Xmx512m -Xms5m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2,TLSv1.3 -Dsun.awt.fontconfig=fontconfig.properties jwrapper.JWrapper "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\unrestricted\JWLaunchProperties-1713608944217-1"
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\crs-agent.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\crs-agent.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\charsets.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\charsets.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\jsse.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\jsse.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\jaccess.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\jaccess.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\sunpkcs11.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\sunpkcs11.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\access-bridge.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\access-bridge.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\access-bridge-32.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\access-bridge-32.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\openjsse.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\openjsse.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\legacy8ujsse.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\legacy8ujsse.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\cldrdata.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\cldrdata.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\sunmscapi.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\ext\sunmscapi.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\rt.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\lib\rt.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\windowslauncher.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\windowslauncher.exe" "-Xshare:dump"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows32JRE-00084000053-complete\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\customer-jar-with-dependencies.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608830-0-app\customer-jar-with-dependencies.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1713608892-0-app\bin\windowslauncher.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows32JRE-00084000053-complete\bin\windowslauncher.exe" -cp "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" -Xmx128m -Xms5m -Dsun.java2d.dpiaware=true "-Djava.library.path=C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete" com.aem.sdesktop.util.MouseMover 127.0.0.1 49722 127.0.0.1 49723 restricted
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows32JRE-00084000053-complete\bin\Session Elevation Helper
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows32JRE-00084000053-complete\bin\Session Elevation Helper" -cp "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" -Xmx128m -Xms5m -Dsun.java2d.dpiaware=true "-Djava.library.path=C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete" com.aem.sdesktop.util.MouseMover 127.0.0.1 49726 127.0.0.1 49727 restricted_backup
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://help.tkfast.com/customer/JWrapper-Windows32JRE-version.txt?time=4211847998
208.75.205.129
malicious
http://help.tkfast.com/simplehelpdisclaimer.txt?language=en
208.75.205.129
malicious
http://help.tkfast.com/branding/brandingfiles?a=3
208.75.205.129
malicious
http://help.tkfast.com/simplehelpdetails.txt
208.75.205.129
malicious
http://help.tkfast.com/customer/JWrapper-Remote%20Support-version.txt
208.75.205.129
malicious
http://help.tkfast.com/server_side_parameters
208.75.205.129
malicious
http://help.tkfast.com/branding/branding.properties?a=3
208.75.205.129
malicious
http://help.tkfast.com/customer/JWrapper-JWrapper-version.txt
208.75.205.129
malicious
http://help.tkfast.com/availableports
208.75.205.129
malicious
http://help.tkfast.com/branding/applet_splash.png?a=3
208.75.205.129
malicious
http://help.tkfast.com/translations_user/en.txt
208.75.205.129
malicious
http://apache.org/xml/features/validation/dynamic
unknown
http://java.sun.com/xml/schema/features/
unknown
http://maven.apache.org/POM/4.0.0
unknown
http://www.azul.com
unknown
http://www.freetype.org/license.html
unknown
http://java.sun.com/xml/dom/properties/%(
unknown
http://maven.apa
unknown
http://www.freebxml.org/).
unknown
http://0.0.254.254
unknown
http://help.tkfast.com
unknown
https://www.whoishostingthis.com/tools/user-agent/
unknown
https://pdfbox.apache.org/download.cgi
unknown
https://pdfbox.apache.org/download.cgissociated
unknown
https://maven.apache.org/xsd/maven-4.0.0.xsd
unknown
http://java.sun.com/xml/stream/properties/report-cdata-event
unknown
http://wildsau.idv.uni-linz.ac.at/mfx/upx.html
unknown
http://0.0.254.254%lu
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
http://www.xfree86.org/)
unknown
http://www.azulsystems.com/support/-XX:FlightRecorderOptions-XX:StartFlightRecordingVM
unknown
http://www.kitfox.com/jackal/jackal.jar
unknown
http://xml.org/sax/features/allow-dtd-events-after-endDTD
unknown
http://www.ecma-international.org/memento/codeofconduct.htm
unknown
http://apache.org/xml/features/validation/balance-syntax-trees
unknown
http://www.unicode.org/cldr/data/.
unknown
http://help.tkfast.com/customer/
unknown
http://javax.xml.XMLConstants/property/accessExternalDTD;
unknown
http://help.tkfast.com/2
unknown
https://secure.comodo.com/CPS0L
unknown
http://java.sun.com/xml/dom/properties/ancestor-check
unknown
http://docs.azul.com/zulu/zulurelnotes/
unknown
http://help.tkfast.com/
unknown
http://www.gnu.org/copyleft/gpl.html
unknown
http://xml.org/sax/properties/lexical-handler
unknown
http://maven.apa.org/POM/4.0.0
unknown
http://www.azul.com/license/zulu_third_party_licenses.html
unknown
http://apache.org/xml/properties/input-buffer-sizenal/im
unknown
http://www.freebxml.org/
unknown
http://www.oracle.com/goto/opensourcecode/request
unknown
http://ocsp.sectigo.com0
unknown
http://apache.org/xml/properties/internal/error-handler
unknown
http://help.tkfast.com/customer
unknown
http://upx.sourceforge.net/upx-license.html.
unknown
http://help.tkfast.com/customerjwdyna_wrapper_gu_versions2jwdyna_languageenjwdyna_skip_system_jre1jw
unknown
http://javax.xml.XMLConstants/property/
unknown
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/file/tip/src/share/native/sun/security/ec/impl
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
http://openjdk.java.net/jeps/220).
unknown
http://mozilla.org/MPL/2.0/.
unknown
http://www.apache.org/).
unknown
http://apache.org/xml/features/standard-uri-conformantrn2
unknown
http://www.unicode.org/Public/
unknown
http://help.tkfast.com/customer/JWrapper-Windows32JRE-version.txt?time=4211847998l
unknown
http://help.tkfast.com/customer/JWrapper-Windows32JRE-version.txt?time=4211847998f
unknown
https://sectigo.com/CPS0D
unknown
http://relaxngcc.sf.net/).
unknown
http://www.nexus.hu/upx
unknown
http://tartarus.org/~martin/PorterStemmer
unknown
http://openjdk.java.net/legal/exception-modules-2007-05-08.html
unknown
http://www.oracle.com/feature/use-service-mechanism
unknown
http://www.oasis-open.org/policies-guidelines/ipr
unknown
http://zulu.org/forum
unknown
http://www.azulsystems.com/
unknown
http://help.tkfast.com/customer/JWrapper-Windows32JRE-version.txt?time=4211847998R
unknown
http://docs.azul.com/zulu/zuludocs/
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://help.tkfast.com/customer/JWrapper-Remote
unknown
http://www.unicode.org/Public/.
unknown
https://sectigo.com/CPS0
unknown
http://java.sun.com/xml/stream/properties/ignore-external-dtdTDP
unknown
http://www.apache.org/licenses/
unknown
http://www.azulsystems.com/support/java.vendor.url.bughttp://www.azulsystems.com/java.vendor.urlAzul
unknown
http://help.tkfast.com/customer/jwstat_app_dirC:
unknown
http://www.unicode.org/reports/
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://xml.org/sax/properties/dom-node
unknown
http://help.tkfast.com/customer/JWrapper-Windows32JRE-version.txt?time=42118479983
unknown
http://java.sun.com/xml/schema/features/report-ignored-element-content-whitespace
unknown
http://www.gnu.org/licenses/gpl-2.0.txt
unknown
http://xml.org/sax/properties/declaration-handler
unknown
https://www.thawte.com/cps0/
unknown
http://www.ecma-international.org
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://www.thawte.com/repository0W
unknown
http://apache.org/xml/properties/internal/stax-entity-resolverXM=
unknown
http://localhost/shtarget.txt
unknown
http://www.unicode.org/copyright.html.
unknown
http://www.azulsystems.com/support/
unknown
http://upx.tsx.org
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
help.tkfast.com
208.75.205.129
malicious

IPs

IP
Domain
Country
Malicious
208.75.205.129
help.tkfast.com
United States
malicious
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
DFD000
heap
page read and write
163C000
heap
page read and write
E0C000
heap
page read and write
1899000
heap
page read and write
C9B000
heap
page read and write
F89000
heap
page read and write
1850000
heap
page read and write
15AE000
heap
page read and write
DDA000
heap
page read and write
CDD000
heap
page read and write
D63000
heap
page read and write
DB3000
heap
page read and write
9D5000
heap
page read and write
D4F000
heap
page read and write
3B000
unkown
page readonly
D34000
heap
page read and write
DFD000
heap
page read and write
179F3000
heap
page read and write
DF6000
heap
page read and write
189E000
heap
page read and write
161F000
heap
page read and write
20000
unkown
page readonly
1647000
heap
page read and write
DFD000
heap
page read and write
DC1000
heap
page read and write
3711000
heap
page read and write
C7A000
heap
page read and write
415000
unkown
page readonly
E03000
heap
page read and write
1601000
heap
page read and write
CDD000
heap
page read and write
1888000
heap
page read and write
1888000
heap
page read and write
172E000
heap
page read and write
1BDA000
heap
page read and write
1744000
heap
page read and write
DF6000
heap
page read and write
CDD000
heap
page read and write
E22000
heap
page read and write
DD9000
heap
page read and write
C74000
heap
page read and write
1BE6000
heap
page read and write
CD1000
heap
page read and write
21000
unkown
page execute read
C93000
heap
page read and write
1506000
heap
page read and write
2E0E000
stack
page read and write
7D5000
heap
page read and write
DC6000
heap
page read and write
45A8000
trusted library allocation
page read and write
E0C000
heap
page read and write
D4A000
heap
page read and write
1DD000
stack
page read and write
DF6000
heap
page read and write
13D4000
heap
page read and write
158B000
heap
page read and write
175C000
heap
page read and write
C72000
heap
page read and write
15FF000
heap
page read and write
DF6000
heap
page read and write
3BDE000
heap
page read and write
182B000
heap
page read and write
FF1000
heap
page read and write
E0A000
heap
page read and write
DF6000
heap
page read and write
E22000
heap
page read and write
3909000
trusted library allocation
page read and write
E09000
heap
page read and write
D60000
heap
page read and write
1620000
heap
page read and write
45A8000
trusted library allocation
page read and write
1555000
heap
page read and write
E03000
heap
page read and write
D43000
heap
page read and write
196B000
heap
page read and write
C3A000
heap
page read and write
CC2000
heap
page read and write
1042000
heap
page read and write
E03000
heap
page read and write
E02000
heap
page read and write
DF6000
heap
page read and write
D33000
heap
page read and write
45000
unkown
page write copy
18B4000
heap
page read and write
172B000
heap
page read and write
E03000
heap
page read and write
1610000
heap
page read and write
E03000
heap
page read and write
E16000
heap
page read and write
1653000
heap
page read and write
46D2000
heap
page read and write
E37000
heap
page read and write
C83000
heap
page read and write
45000
unkown
page read and write
DF6000
heap
page read and write
DFD000
heap
page read and write
E0C000
heap
page read and write
883000
heap
page read and write
D33000
heap
page read and write
1BCA000
heap
page read and write
1610000
heap
page read and write
AC0000
heap
page read and write
A83000
heap
page read and write
C3E000
heap
page read and write
A5C000
heap
page read and write
C93000
heap
page read and write
170B000
heap
page read and write
1628000
heap
page read and write
D5F000
heap
page read and write
195F000
heap
page read and write
39B0000
heap
page read and write
C82000
heap
page read and write
D02000
heap
page read and write
AC0000
heap
page read and write
DFD000
heap
page read and write
1621000
heap
page read and write
1B2D000
heap
page read and write
DBB000
heap
page read and write
1938000
heap
page read and write
183F000
heap
page read and write
DF6000
heap
page read and write
A63000
heap
page read and write
4683000
heap
page read and write
CDD000
heap
page read and write
E8A000
heap
page read and write
C72000
heap
page read and write
DB5000
heap
page read and write
108D000
stack
page read and write
D89000
heap
page read and write
D4A000
heap
page read and write
AB0000
heap
page read and write
DFD000
heap
page read and write
18F8000
heap
page read and write
16FD000
heap
page read and write
170FF000
unkown
page read and write
6CEF0000
unkown
page readonly
20000
unkown
page readonly
AD0000
heap
page read and write
1888000
heap
page read and write
F91000
heap
page read and write
1647000
heap
page read and write
DC1000
heap
page read and write
DD4000
heap
page read and write
1BC6000
heap
page read and write
A73000
heap
page read and write
8C0000
heap
page read and write
E4C000
heap
page read and write
E35000
heap
page read and write
F7E000
stack
page read and write
1960000
heap
page read and write
3B33000
heap
page read and write
DC1000
heap
page read and write
623000
heap
page read and write
1720000
heap
page read and write
457F000
trusted library allocation
page read and write
C82000
heap
page read and write
1653000
heap
page read and write
1740000
heap
page read and write
20000
unkown
page readonly
DC4000
heap
page read and write
1647000
heap
page read and write
15DD000
heap
page read and write
A5B000
heap
page read and write
D63000
heap
page read and write
E37000
heap
page read and write
D4A000
heap
page read and write
161F000
heap
page read and write
C93000
heap
page read and write
DF6000
heap
page read and write
D34000
heap
page read and write
E22000
heap
page read and write
160F000
heap
page read and write
1BFF000
heap
page read and write
415000
unkown
page readonly
E07000
heap
page read and write
1BDA000
heap
page read and write
E45000
heap
page read and write
164F000
heap
page read and write
C82000
heap
page read and write
15AE000
heap
page read and write
A79000
heap
page read and write
AD0000
heap
page read and write
D98000
heap
page read and write
CD5000
heap
page read and write
A73000
heap
page read and write
C72000
heap
page read and write
AED000
heap
page read and write
100E000
heap
page read and write
15CD000
heap
page read and write
AED000
heap
page read and write
C82000
heap
page read and write
1777F000
stack
page read and write
1720000
heap
page read and write
A3F000
heap
page read and write
1700000
heap
page read and write
D00000
heap
page read and write
E5E000
heap
page read and write
60A000
heap
page read and write
17D0000
heap
page read and write
E0A000
heap
page read and write
3261000
heap
page read and write
DFD000
heap
page read and write
FE0000
heap
page read and write
DF6000
heap
page read and write
3FE8000
heap
page read and write
D34000
heap
page read and write
E45000
heap
page read and write
174F000
heap
page read and write
E0A000
heap
page read and write
10CC000
heap
page read and write
DC1000
heap
page read and write
DF0000
heap
page read and write
1600000
heap
page read and write
A1B000
heap
page read and write
A3F000
heap
page read and write
A87000
heap
page read and write
1BB6000
heap
page read and write
18AD000
heap
page read and write
E06000
heap
page read and write
A5B000
heap
page read and write
DE8000
heap
page read and write
E45000
heap
page read and write
DCC000
heap
page read and write
A3F000
heap
page read and write
E45000
heap
page read and write
AD0000
heap
page read and write
18BEE000
unkown
page read and write
173B000
heap
page read and write
FF3000
heap
page read and write
A73000
heap
page read and write
C82000
heap
page read and write
9E4000
heap
page read and write
164F000
heap
page read and write
A5B000
heap
page read and write
15E1000
heap
page read and write
C73000
heap
page read and write
E0C000
heap
page read and write
D57000
heap
page read and write
D98000
heap
page read and write
6CEF1000
unkown
page execute read
25B7C000
heap
page read and write
E08000
heap
page read and write
AD0000
heap
page read and write
3A5F000
heap
page read and write
1840000
heap
page read and write
960000
unkown
page read and write
3A0000
heap
page read and write
AC0000
heap
page read and write
1824000
heap
page read and write
25B95000
heap
page read and write
D4A000
heap
page read and write
1980000
heap
page read and write
1658000
heap
page read and write
D84000
heap
page read and write
1647000
heap
page read and write
C9B000
heap
page read and write
1035000
heap
page read and write
A83000
heap
page read and write
1227000
heap
page read and write
4C6D000
heap
page read and write
22E9000
trusted library allocation
page read and write
458F000
trusted library allocation
page read and write
18AD000
heap
page read and write
DD4000
heap
page read and write
4579000
trusted library allocation
page read and write
19AD000
heap
page read and write
A83000
heap
page read and write
AED000
heap
page read and write
C73000
heap
page read and write
9F7000
heap
page read and write
DB8000
heap
page read and write
1664000
heap
page read and write
D33000
heap
page read and write
1840000
heap
page read and write
771000
heap
page read and write
AED000
heap
page read and write
E65000
heap
page read and write
E55000
heap
page read and write
C83000
heap
page read and write
20000
unkown
page readonly
173E000
heap
page read and write
164F000
heap
page read and write
3374000
heap
page read and write
1BE6000
heap
page read and write
1664000
heap
page read and write
CDD000
heap
page read and write
4FD000
stack
page read and write
DF6000
heap
page read and write
A3F000
heap
page read and write
163B000
heap
page read and write
1616000
heap
page read and write
DFD000
heap
page read and write
DE4000
heap
page read and write
E22000
heap
page read and write
D33000
heap
page read and write
E0C000
heap
page read and write
45000
unkown
page write copy
1620000
heap
page read and write
DFD000
heap
page read and write
DB3000
heap
page read and write
2417000
heap
page read and write
19AD000
heap
page read and write
139B000
heap
page read and write
1647000
heap
page read and write
1BC6000
heap
page read and write
9FC000
heap
page read and write
457F000
trusted library allocation
page read and write
DFD000
heap
page read and write
D9A000
heap
page read and write
6E47C000
unkown
page read and write
A74000
heap
page read and write
D4A000
heap
page read and write
DB3000
heap
page read and write
20000
unkown
page readonly
DFD000
heap
page read and write
C590000
direct allocation
page read and write
6CF62000
unkown
page read and write
17A27000
heap
page read and write
B9F000
stack
page read and write
163D000
heap
page read and write
A87000
heap
page read and write
148D000
heap
page read and write
D53000
heap
page read and write
C72000
heap
page read and write
DB3000
heap
page read and write
D5D000
heap
page read and write
E24000
heap
page read and write
173A000
heap
page read and write
E03000
heap
page read and write
E0A000
heap
page read and write
DDB000
heap
page read and write
DD7000
heap
page read and write
195C000
heap
page read and write
1658000
heap
page read and write
163D000
heap
page read and write
E04000
heap
page read and write
22A0000
heap
page read and write
DFD000
heap
page read and write
1728000
heap
page read and write
4063000
heap
page read and write
1990000
heap
page read and write
D65000
heap
page read and write
DC4000
heap
page read and write
C72000
heap
page read and write
DCC000
heap
page read and write
6CFA9000
unkown
page readonly
E2A000
heap
page read and write
D37000
heap
page read and write
DE8000
heap
page read and write
7050000
direct allocation
page read and write
1990000
heap
page read and write
1381000
heap
page read and write
A3F000
heap
page read and write
49D0000
heap
page read and write
CD1000
heap
page read and write
C8D000
heap
page read and write
DE8000
heap
page read and write
AED000
heap
page read and write
DC0000
heap
page read and write
C73000
heap
page read and write
A0B000
heap
page read and write
771000
heap
page read and write
3B4F000
heap
page read and write
168F000
stack
page read and write
D43000
heap
page read and write
E66000
heap
page read and write
1640000
heap
page read and write
C6D000
stack
page read and write
3C56000
heap
page read and write
E23000
heap
page read and write
17EE000
heap
page read and write
3BA5000
heap
page read and write
1594000
heap
page read and write
DC5000
heap
page read and write
DF0000
heap
page read and write
12BC000
heap
page read and write
131B000
heap
page read and write
766000
heap
page read and write
DF6000
heap
page read and write
E03000
heap
page read and write
A73000
heap
page read and write
E45000
heap
page read and write
D43000
heap
page read and write
A31000
heap
page read and write
A5B000
heap
page read and write
A79000
heap
page read and write
7D1000
heap
page read and write
A5B000
heap
page read and write
DD4000
heap
page read and write
D63000
heap
page read and write
1622000
heap
page read and write
25BA5000
heap
page read and write
CC2000
heap
page read and write
D01000
heap
page read and write
D57000
heap
page read and write
E06000
heap
page read and write
A31000
heap
page read and write
E0A000
heap
page read and write
19C000
stack
page read and write
3B64000
heap
page read and write
1653000
heap
page read and write
15A1000
heap
page read and write
2412000
heap
page read and write
D43000
heap
page read and write
189E000
heap
page read and write
E02000
heap
page read and write
164F000
heap
page read and write
A63000
heap
page read and write
6CFA4000
unkown
page read and write
D63000
heap
page read and write
E00000
heap
page read and write
456F000
trusted library allocation
page read and write
101F000
heap
page read and write
13C0000
heap
page read and write
E0C000
heap
page read and write
C83000
heap
page read and write
457F000
trusted library allocation
page read and write
1616000
heap
page read and write
D65000
heap
page read and write
4569000
trusted library allocation
page read and write
A76000
heap
page read and write
E16000
heap
page read and write
DBB000
heap
page read and write
C9D000
heap
page read and write
AC0000
heap
page read and write
1BCA000
heap
page read and write
1BB6000
heap
page read and write
D43000
heap
page read and write
E2C000
heap
page read and write
C73000
heap
page read and write
163C000
heap
page read and write
AC0000
heap
page read and write
172B000
heap
page read and write
1015000
heap
page read and write
AED000
heap
page read and write
CD5000
heap
page read and write
1980000
heap
page read and write
C9B000
heap
page read and write
A1B000
heap
page read and write
21000
unkown
page execute read
E0C000
heap
page read and write
C9B000
heap
page read and write
1BFF000
heap
page read and write
1633000
heap
page read and write
166C000
heap
page read and write
7E0000
heap
page read and write
E0C000
heap
page read and write
E2A000
heap
page read and write
47000
unkown
page read and write
AD0000
heap
page read and write
D4A000
heap
page read and write
ADF000
stack
page read and write
118B000
heap
page read and write
E37000
heap
page read and write
D24000
heap
page read and write
F8D000
heap
page read and write
E20000
heap
page read and write
C9B000
heap
page read and write
F30000
heap
page read and write
DFE000
heap
page read and write
E26000
heap
page read and write
DE8000
heap
page read and write
DF6000
heap
page read and write
6CF4B000
unkown
page read and write
CDD000
heap
page read and write
C9B000
heap
page read and write
1BDE000
heap
page read and write
1001000
heap
page read and write
DC4000
heap
page read and write
DD4000
heap
page read and write
D57000
heap
page read and write
A79000
heap
page read and write
E0C000
heap
page read and write
39E1000
heap
page read and write
4C9A000
heap
page read and write
1899000
heap
page read and write
A5C000
heap
page read and write
1620000
heap
page read and write
1736000
heap
page read and write
3AB7000
heap
page read and write
D72000
heap
page read and write
733B000
direct allocation
page read and write
E11000
heap
page read and write
DFD000
heap
page read and write
C9B000
heap
page read and write
A87000
heap
page read and write
E1A000
heap
page read and write
3B3B000
heap
page read and write
1875000
heap
page read and write
6CA6A000
unkown
page readonly
1990000
heap
page read and write
18B4000
heap
page read and write
CD72000
heap
page read and write
4570000
direct allocation
page read and write
E0A000
heap
page read and write
D53000
heap
page read and write
12A1000
heap
page read and write
195F000
heap
page read and write
1BDA000
heap
page read and write
DE5000
heap
page read and write
D3A000
heap
page read and write
162A000
heap
page read and write
1600000
heap
page read and write
C82000
heap
page read and write
412000
unkown
page write copy
DAB000
heap
page read and write
3B23000
heap
page read and write
E32000
heap
page read and write
D7F000
heap
page read and write
1846F000
unkown
page read and write
1616000
heap
page read and write
C93000
heap
page read and write
20000
unkown
page readonly
70C4000
direct allocation
page read and write
18B4000
heap
page read and write
15DB000
heap
page read and write
164F000
heap
page read and write
DC1000
heap
page read and write
E32000
heap
page read and write
47000
unkown
page write copy
DCC000
heap
page read and write
37CE000
stack
page read and write
1889000
heap
page read and write
5BA000
heap
page read and write
C36000
heap
page read and write
AC0000
heap
page read and write
E0C000
heap
page read and write
C83000
heap
page read and write
39E1000
heap
page read and write
1750000
heap
page read and write
1BE6000
heap
page read and write
4530000
heap
page read and write
D97000
heap
page read and write
D97000
heap
page read and write
1620000
heap
page read and write
172A000
heap
page read and write
172B000
heap
page read and write
167F000
heap
page read and write
E40000
heap
page read and write
45000
unkown
page write copy
164F000
heap
page read and write
D3A000
heap
page read and write
466A000
heap
page read and write
45000
unkown
page write copy
A5B000
heap
page read and write
E0C000
heap
page read and write
1BFF000
heap
page read and write
3AB1000
heap
page read and write
D24000
heap
page read and write
D63000
heap
page read and write
A73000
heap
page read and write
D76000
heap
page read and write
D4F000
heap
page read and write
171B000
heap
page read and write
1388000
heap
page read and write
A83000
heap
page read and write
A73000
heap
page read and write
1200000
heap
page read and write
6CEF0000
unkown
page readonly
1662000
heap
page read and write
161F000
heap
page read and write
FDC000
heap
page read and write
1875000
heap
page read and write
18AD000
heap
page read and write
DFD000
heap
page read and write
A8F000
heap
page read and write
AAA000
heap
page read and write
AD0000
heap
page read and write
19B0000
heap
page read and write
6CFA4000
unkown
page read and write
D84000
heap
page read and write
1797000
heap
page read and write
A79000
heap
page read and write
DE4000
heap
page read and write
E03000
heap
page read and write
DE8000
heap
page read and write
1647000
heap
page read and write
DF6000
heap
page read and write
164F000
heap
page read and write
D84000
heap
page read and write
A74000
heap
page read and write
E03000
heap
page read and write
AC0000
heap
page read and write
A31000
heap
page read and write
E03000
heap
page read and write
D3A000
heap
page read and write
25D76000
heap
page read and write
17B9000
heap
page read and write
A31000
heap
page read and write
6CFA4000
unkown
page read and write
C93000
heap
page read and write
A63000
heap
page read and write
1621000
heap
page read and write
1611000
heap
page read and write
BDF000
stack
page read and write
1653000
heap
page read and write
C9B000
heap
page read and write
A5B000
heap
page read and write
D24000
heap
page read and write
DC1000
heap
page read and write
E11000
heap
page read and write
C59000
heap
page read and write
168F000
stack
page read and write
D24000
heap
page read and write
D8F000
stack
page read and write
AD0000
heap
page read and write
3667000
heap
page read and write
D24000
heap
page read and write
6CFA6000
unkown
page write copy
1BFF000
heap
page read and write
DBB000
heap
page read and write
1601000
heap
page read and write
DD000
stack
page read and write
170A000
heap
page read and write
E02000
heap
page read and write
DBB000
heap
page read and write
1888000
heap
page read and write
18BEB000
unkown
page read and write
AC0000
heap
page read and write
DC1000
heap
page read and write
E4C000
heap
page read and write
1704000
heap
page read and write
A83000
heap
page read and write
E91000
heap
page read and write
766000
heap
page read and write
171B000
heap
page read and write
1BC6000
heap
page read and write
1811000
heap
page read and write
1008000
heap
page read and write
D03000
heap
page read and write
DFD000
heap
page read and write
1BCA000
heap
page read and write
D24000
heap
page read and write
1706000
heap
page read and write
1664000
heap
page read and write
1320000
heap
page read and write
19AD000
heap
page read and write
D63000
heap
page read and write
19AD000
heap
page read and write
DD4000
heap
page read and write
AC0000
heap
page read and write
1623000
heap
page read and write
1751000
heap
page read and write
E5D000
heap
page read and write
1740000
heap
page read and write
C82000
heap
page read and write
1980000
heap
page read and write
164F000
heap
page read and write
DF6000
heap
page read and write
E0C000
heap
page read and write
4696000
heap
page read and write
E03000
heap
page read and write
A87000
heap
page read and write
E4C000
heap
page read and write
DBB000
heap
page read and write
19AD000
heap
page read and write
16E1000
heap
page read and write
1653000
heap
page read and write
D34000
heap
page read and write
196C000
heap
page read and write
E16000
heap
page read and write
45000
unkown
page read and write
1640000
heap
page read and write
1960000
heap
page read and write
A3F000
heap
page read and write
1501000
heap
page read and write
C5EB000
direct allocation
page read and write
1875000
heap
page read and write
E03000
heap
page read and write
4676000
heap
page read and write
1898000
heap
page read and write
E03000
heap
page read and write
162F000
heap
page read and write
D29000
heap
page read and write
D4A000
heap
page read and write
3269000
heap
page read and write
DF6000
heap
page read and write
D43000
heap
page read and write
4530000
heap
page read and write
163C000
heap
page read and write
164A000
heap
page read and write
75F000
heap
page read and write
170A000
heap
page read and write
AC0000
heap
page read and write
DA7000
heap
page read and write
1850000
heap
page read and write
10CE000
heap
page read and write
18B4000
heap
page read and write
185AF000
unkown
page read and write
DC1000
heap
page read and write
AB1000
heap
page read and write
DC1000
heap
page read and write
1660000
heap
page read and write
1634000
heap
page read and write
3990000
heap
page read and write
3C67000
heap
page read and write
1658000
heap
page read and write
1BCA000
heap
page read and write
4569000
trusted library allocation
page read and write
DD0000
heap
page read and write
D5F000
heap
page read and write
47000
unkown
page read and write
1620000
heap
page read and write
C82000
heap
page read and write
D7B000
heap
page read and write
E03000
heap
page read and write
CDD000
heap
page read and write
D24000
heap
page read and write
1610000
heap
page read and write
A8F000
heap
page read and write
3707000
heap
page read and write
3B9C000
heap
page read and write
48000
unkown
page readonly
A8F000
heap
page read and write
C3A000
heap
page read and write
25B58000
heap
page read and write
47000
unkown
page write copy
162D000
heap
page read and write
370F000
stack
page read and write
466A000
heap
page read and write
D3C000
heap
page read and write
182E000
heap
page read and write
1324000
heap
page read and write
1AE1000
heap
page read and write
173B000
heap
page read and write
173B000
heap
page read and write
15DD000
heap
page read and write
3B000
unkown
page readonly
CD1000
heap
page read and write
A63000
heap
page read and write
40FD000
heap
page read and write
3C23000
heap
page read and write
C9B000
heap
page read and write
CD1000
heap
page read and write
E1A000
heap
page read and write
771000
heap
page read and write
75F000
heap
page read and write
A1B000
heap
page read and write
D57000
heap
page read and write
E4C000
heap
page read and write
E22000
heap
page read and write
DBB000
heap
page read and write
24A8000
heap
page read and write
DD4000
heap
page read and write
DF4000
heap
page read and write
D24000
heap
page read and write
E0C000
heap
page read and write
C9B000
heap
page read and write
1BCA000
heap
page read and write
11EF000
stack
page read and write
1640000
heap
page read and write
159B000
heap
page read and write
20000
unkown
page readonly
1BCA000
heap
page read and write
A23000
heap
page read and write
1736000
heap
page read and write
D60000
heap
page read and write
C7C2000
direct allocation
page read and write
6CEF1000
unkown
page execute read
400000
unkown
page readonly
D3A000
heap
page read and write
C93000
heap
page read and write
21000
unkown
page execute read
D3C000
heap
page read and write
3B4B000
heap
page read and write
AED000
heap
page read and write
171B000
heap
page read and write
DFD000
heap
page read and write
1591000
heap
page read and write
45B8000
trusted library allocation
page read and write
C82000
heap
page read and write
5C3000
heap
page read and write
189C000
heap
page read and write
E239000
heap
page read and write
1BDE000
heap
page read and write
DD5000
heap
page read and write
1630000
heap
page read and write
1647000
heap
page read and write
DF6000
heap
page read and write
1653000
heap
page read and write
A5B000
heap
page read and write
25B21000
heap
page read and write
189C000
heap
page read and write
CDD000
heap
page read and write
A31000
heap
page read and write
BB0000
heap
page read and write
DD8000
heap
page read and write
1850000
heap
page read and write
6CFA4000
unkown
page read and write
D60000
heap
page read and write
E45000
heap
page read and write
E0C000
heap
page read and write
E16000
heap
page read and write
1620000
heap
page read and write
456F000
trusted library allocation
page read and write
A87000
heap
page read and write
D51000
heap
page read and write
C93000
heap
page read and write
340E000
stack
page read and write
161F000
heap
page read and write
E21000
heap
page read and write
E37000
heap
page read and write
6CFA6000
unkown
page write copy
25CBD000
heap
page read and write
D5E000
heap
page read and write
A5B000
heap
page read and write
87E000
stack
page read and write
DC1000
heap
page read and write
D60000
heap
page read and write
47000
unkown
page write copy
E37000
heap
page read and write
C7A000
heap
page read and write
DF6000
heap
page read and write
1BB4000
heap
page read and write
E1A000
heap
page read and write
D3A000
heap
page read and write
DF6000
heap
page read and write
1850000
heap
page read and write
E16000
heap
page read and write
D4F000
heap
page read and write
CF2000
heap
page read and write
1634000
heap
page read and write
D03000
heap
page read and write
DE8000
heap
page read and write
C5F1000
direct allocation
page read and write
D8B000
heap
page read and write
D60000
heap
page read and write
F6D000
heap
page read and write
15B1000
heap
page read and write
D4F000
heap
page read and write
3BBC000
heap
page read and write
A76000
heap
page read and write
18B4000
heap
page read and write
A87000
heap
page read and write
CC6000
heap
page read and write
3B000
unkown
page readonly
4683000
heap
page read and write
D5F000
heap
page read and write
D5F000
heap
page read and write
A8F000
heap
page read and write
DE4000
heap
page read and write
DE0000
heap
page read and write
21000
unkown
page execute read
E0A000
heap
page read and write
E0C000
heap
page read and write
1899000
heap
page read and write
4579000
trusted library allocation
page read and write
1741000
heap
page read and write
174F000
heap
page read and write
DCC000
heap
page read and write
378E000
stack
page read and write
1278000
heap
page read and write
1706000
heap
page read and write
3A60000
heap
page read and write
1990000
heap
page read and write
E45000
heap
page read and write
E03000
heap
page read and write
1611000
heap
page read and write
172A000
heap
page read and write
3BCC000
heap
page read and write
E03000
heap
page read and write
C83000
heap
page read and write
AC0000
heap
page read and write
28E1000
heap
page read and write
5FD000
stack
page read and write
D63000
heap
page read and write
E06000
heap
page read and write
161F000
heap
page read and write
1850000
heap
page read and write
3B4F000
heap
page read and write
18E8000
heap
page read and write
3B000
unkown
page readonly
D6A000
heap
page read and write
1740000
heap
page read and write
163C000
heap
page read and write
C73000
heap
page read and write
1760000
heap
page read and write
160F000
heap
page read and write
20000
unkown
page readonly
E1A000
heap
page read and write
A79000
heap
page read and write
164F000
heap
page read and write
DF6000
heap
page read and write
733F0000
unkown
page readonly
1BC6000
heap
page read and write
D24000
heap
page read and write
BE9000
heap
page read and write
A31000
heap
page read and write
19AD000
heap
page read and write
72B0000
direct allocation
page read and write
DD8000
heap
page read and write
173C000
heap
page read and write
A5B000
heap
page read and write
A1B000
heap
page read and write
9FC000
heap
page read and write
1BC6000
heap
page read and write
A79000
heap
page read and write
154F000
heap
page read and write
6CFA4000
unkown
page read and write
E0C000
heap
page read and write
D24000
heap
page read and write
DC5000
heap
page read and write
E32000
heap
page read and write
E37000
heap
page read and write
E26000
heap
page read and write
D48000
heap
page read and write
1399000
heap
page read and write
6CFA6000
unkown
page write copy
DDA000
heap
page read and write
4766000
heap
page read and write
E0C000
heap
page read and write
E01000
heap
page read and write
E0C000
heap
page read and write
1351000
heap
page read and write
D03000
heap
page read and write
1C31000
heap
page read and write
C9B000
heap
page read and write
E0C000
heap
page read and write
C9B000
heap
page read and write
1634000
heap
page read and write
A87000
heap
page read and write
DF6000
heap
page read and write
D63000
heap
page read and write
A8F000
heap
page read and write
3BCD000
heap
page read and write
195F000
heap
page read and write
417E000
heap
page read and write
3B58000
heap
page read and write
189E000
heap
page read and write
1653000
heap
page read and write
AD0000
heap
page read and write
A3F000
heap
page read and write
3C92000
heap
page read and write
38C0000
heap
page read and write
1BDE000
heap
page read and write
18AD000
heap
page read and write
16FD000
heap
page read and write
A87000
heap
page read and write
2A0B9000
heap
page read and write
D3F000
heap
page read and write
1990000
heap
page read and write
C83000
heap
page read and write
C5D000
stack
page read and write
D4C000
heap
page read and write
DCC000
heap
page read and write
A63000
heap
page read and write
1BFF000
heap
page read and write
E17000
heap
page read and write
1664000
heap
page read and write
1610000
heap
page read and write
466A000
heap
page read and write
D4A000
heap
page read and write
A73000
heap
page read and write
1BFF000
heap
page read and write
E45000
heap
page read and write
5B0000
heap
page read and write
164F000
heap
page read and write
1AE6000
heap
page read and write
DD5000
heap
page read and write
A78000
heap
page read and write
D48000
heap
page read and write
15AE000
heap
page read and write
DAA000
heap
page read and write
D65000
heap
page read and write
D43000
heap
page read and write
173A000
heap
page read and write
DFD000
heap
page read and write
C83000
heap
page read and write
DF6000
heap
page read and write
2A111000
heap
page read and write
173A000
heap
page read and write
E0C000
heap
page read and write
D53000
heap
page read and write
A3F000
heap
page read and write
C82000
heap
page read and write
E5D000
heap
page read and write
173A000
heap
page read and write
C82E000
direct allocation
page read and write
1640000
heap
page read and write
A5B000
heap
page read and write
D63000
heap
page read and write
A3F000
heap
page read and write
A31000
heap
page read and write
E16000
heap
page read and write
AC0000
heap
page read and write
D65000
heap
page read and write
DCC000
heap
page read and write
173B000
heap
page read and write
E22000
heap
page read and write
E1A000
heap
page read and write
DF6000
heap
page read and write
C9B000
heap
page read and write
15B8000
heap
page read and write
C9B000
heap
page read and write
EF0000
heap
page read and write
E03000
heap
page read and write
E07000
heap
page read and write
E37000
heap
page read and write
E219000
heap
page read and write
1990000
heap
page read and write
1990000
heap
page read and write
D18000
heap
page read and write
A63000
heap
page read and write
E83000
heap
page read and write
60E000
stack
page read and write
E0A000
heap
page read and write
E0A000
heap
page read and write
D24000
heap
page read and write
75F000
heap
page read and write
1008000
heap
page read and write
48000
unkown
page readonly
E03000
heap
page read and write
173A000
heap
page read and write
49DB000
heap
page read and write
16FD000
heap
page read and write
C7A000
heap
page read and write
163C000
heap
page read and write
D60000
heap
page read and write
18B4000
heap
page read and write
C9B000
heap
page read and write
CD79000
heap
page read and write
175C000
heap
page read and write
E0A000
heap
page read and write
158E000
heap
page read and write
CC2000
heap
page read and write
A63000
heap
page read and write
DE4000
heap
page read and write
D63000
heap
page read and write
E03000
heap
page read and write
D84000
heap
page read and write
164F000
heap
page read and write
1850000
heap
page read and write
ED0000
heap
page read and write
D3A000
heap
page read and write
C72000
heap
page read and write
18B4000
heap
page read and write
164F000
heap
page read and write
18B4000
heap
page read and write
1620000
heap
page read and write
1658000
heap
page read and write
E0C000
heap
page read and write
1BDA000
heap
page read and write
DA2000
heap
page read and write
6CFA6000
unkown
page write copy
1640000
heap
page read and write
C82000
heap
page read and write
1850000
heap
page read and write
D33000
heap
page read and write
1553000
heap
page read and write
DD8000
heap
page read and write
C9B000
heap
page read and write
C73000
heap
page read and write
1990000
heap
page read and write
3BCC000
heap
page read and write
709D000
direct allocation
page read and write
AC0000
heap
page read and write
A83000
heap
page read and write
189F000
heap
page read and write
D03000
heap
page read and write
E0C000
heap
page read and write
1899000
heap
page read and write
DB5000
heap
page read and write
E0C000
heap
page read and write
15EE000
heap
page read and write
A31000
heap
page read and write
3C86000
heap
page read and write
F8D000
heap
page read and write
A87000
heap
page read and write
3BBC000
heap
page read and write
1875000
heap
page read and write
E5D000
heap
page read and write
D24000
heap
page read and write
E45000
heap
page read and write
12B0000
heap
page read and write
1990000
heap
page read and write
1990000
heap
page read and write
CDD000
heap
page read and write
D65000
heap
page read and write
E06000
heap
page read and write
C83000
heap
page read and write
E90000
heap
page read and write
C72000
heap
page read and write
E45000
heap
page read and write
DCC000
heap
page read and write
1819000
heap
page read and write
1980000
heap
page read and write
1888000
heap
page read and write
1647000
heap
page read and write
1640000
heap
page read and write
1630000
heap
page read and write
A5B000
heap
page read and write
48000
unkown
page readonly
D01000
heap
page read and write
DC4000
heap
page read and write
AC0000
heap
page read and write
718D000
direct allocation
page read and write
25A0000
heap
page read and write
6CF35000
unkown
page read and write
7152000
direct allocation
page read and write
DD8000
heap
page read and write
E37000
heap
page read and write
A90000
heap
page read and write
12C0000
heap
page read and write
1BE6000
heap
page read and write
F85000
heap
page read and write
D98000
heap
page read and write
980000
heap
page read and write
E10000
heap
page read and write
1BE6000
heap
page read and write
A8F000
heap
page read and write
C9B000
heap
page read and write
D97000
heap
page read and write
33DC000
heap
page read and write
1830000
heap
page read and write
E32000
heap
page read and write
A73000
heap
page read and write
E2A000
heap
page read and write
E45000
heap
page read and write
CDD000
heap
page read and write
A76000
heap
page read and write
DF6000
heap
page read and write
15B0000
heap
page read and write
D34000
heap
page read and write
1647000
heap
page read and write
E0A000
heap
page read and write
8FF000
stack
page read and write
438000
unkown
page readonly
F90000
heap
page read and write
DFD000
heap
page read and write
C82000
heap
page read and write
D99000
heap
page read and write
1664000
heap
page read and write
A1B000
heap
page read and write
D3A000
heap
page read and write
DCC000
heap
page read and write
C5D9000
direct allocation
page read and write
E9A000
heap
page read and write
3B60000
heap
page read and write
C7A000
heap
page read and write
C7B000
heap
page read and write
E0C000
heap
page read and write
AD0000
heap
page read and write
4530000
heap
page read and write
C73000
heap
page read and write
19AD000
heap
page read and write
E0C000
heap
page read and write
1039000
heap
page read and write
3BAC000
heap
page read and write
1647000
heap
page read and write
E4C000
heap
page read and write
A83000
heap
page read and write
3B8F000
heap
page read and write
1805000
heap
page read and write
1653000
heap
page read and write
25C8D000
heap
page read and write
167E000
heap
page read and write
164F000
heap
page read and write
4530000
heap
page read and write
73EF000
direct allocation
page read and write
D4F000
heap
page read and write
165C000
heap
page read and write
1658000
heap
page read and write
1611000
heap
page read and write
185B000
heap
page read and write
1990000
heap
page read and write
CCCD000
heap
page read and write
AB1000
heap
page read and write
1755000
heap
page read and write
DF6000
heap
page read and write
E22000
heap
page read and write
C82000
heap
page read and write
48000
unkown
page readonly
1621000
heap
page read and write
E22000
heap
page read and write
437F000
unkown
page read and write
1840000
heap
page read and write
D3A000
heap
page read and write
CDD000
heap
page read and write
D4A000
heap
page read and write
1BC6000
heap
page read and write
160F000
heap
page read and write
C72000
heap
page read and write
D98000
heap
page read and write
E16000
heap
page read and write
6CF5B000
unkown
page read and write
1653000
heap
page read and write
DF6000
heap
page read and write
C93000
heap
page read and write
A83000
heap
page read and write
AED000
heap
page read and write
18870000
direct allocation
page read and write
D43000
heap
page read and write
A79000
heap
page read and write
2405000
heap
page read and write
C82000
heap
page read and write
D88000
heap
page read and write
19AD000
heap
page read and write
D97000
heap
page read and write
75F000
heap
page read and write
DFD000
heap
page read and write
163C000
heap
page read and write
48000
unkown
page readonly
710C000
direct allocation
page read and write
1751000
heap
page read and write
25B75000
heap
page read and write
DC1000
heap
page read and write
C7A000
heap
page read and write
A23000
heap
page read and write
E0C000
heap
page read and write
D96000
heap
page read and write
D53000
heap
page read and write
1610000
heap
page read and write
185B000
heap
page read and write
DE8000
heap
page read and write
1621000
heap
page read and write
48000
unkown
page readonly
C5EE000
direct allocation
page read and write
1A6D000
heap
page read and write
3361000
heap
page read and write
160B000
heap
page read and write
E5D000
heap
page read and write
1981000
heap
page read and write
A76000
heap
page read and write
1BFF000
heap
page read and write
766000
heap
page read and write
48000
unkown
page readonly
4579000
trusted library allocation
page read and write
1041000
heap
page read and write
CDD000
heap
page read and write
3DB8000
heap
page read and write
E0A000
heap
page read and write
15AC000
heap
page read and write
171B000
heap
page read and write
12FF000
stack
page read and write
400000
unkown
page readonly
D76000
heap
page read and write
D60000
heap
page read and write
6E0FD000
unkown
page readonly
D63000
heap
page read and write
A23000
heap
page read and write
45A8000
trusted library allocation
page read and write
E22000
heap
page read and write
15BC000
heap
page read and write
37F1000
heap
page read and write
E03000
heap
page read and write
D8E000
heap
page read and write
3B9C000
heap
page read and write
DE8000
heap
page read and write
1C30000
heap
page read and write
D60000
heap
page read and write
15B4000
heap
page read and write
6CEF0000
unkown
page readonly
18A8000
heap
page read and write
D33000
heap
page read and write
401000
unkown
page execute read
9F4000
heap
page read and write
25CC1000
heap
page read and write
20000
unkown
page readonly
185B000
heap
page read and write
D43000
heap
page read and write
160F000
heap
page read and write
D5C000
stack
page read and write
47000
unkown
page write copy
E0C000
heap
page read and write
1601000
heap
page read and write
171FF000
unkown
page read and write
D65000
heap
page read and write
3B4B000
heap
page read and write
E0C000
heap
page read and write
E37000
heap
page read and write
1898000
heap
page read and write
CDD000
heap
page read and write
3ABF000
trusted library allocation
page read and write
C73000
heap
page read and write
166C000
heap
page read and write
E45000
heap
page read and write
E02000
heap
page read and write
E6B000
heap
page read and write
3560000
heap
page read and write
7FE000
stack
page read and write
D5F000
heap
page read and write
458F000
trusted library allocation
page read and write
14F1000
heap
page read and write
456F000
trusted library allocation
page read and write
E4C000
heap
page read and write
DD8000
heap
page read and write
D63000
heap
page read and write
A73000
heap
page read and write
DF0000
heap
page read and write
A1B000
heap
page read and write
860000
heap
page read and write
1310000
heap
page read and write
4569000
trusted library allocation
page read and write
E0A000
heap
page read and write
4A80000
heap
page read and write
E5D000
heap
page read and write
88A000
heap
page read and write
172B000
heap
page read and write
163C000
heap
page read and write
DF0000
heap
page read and write
1BC6000
heap
page read and write
DE8000
heap
page read and write
E0C000
heap
page read and write
9EA000
heap
page read and write
A73000
heap
page read and write
A87000
heap
page read and write
6E0F7000
unkown
page readonly
DFD000
heap
page read and write
DA3000
heap
page read and write
173A000
heap
page read and write
E01000
heap
page read and write
1647000
heap
page read and write
D37000
heap
page read and write
379F000
trusted library allocation
page read and write
73BB000
direct allocation
page read and write
3FE1000
heap
page read and write
3B84000
heap
page read and write
3AB9000
trusted library allocation
page read and write
1640000
heap
page read and write
DE4000
heap
page read and write
73A9A000
unkown
page readonly
9D5000
heap
page read and write
E22000
heap
page read and write
4579000
trusted library allocation
page read and write
D4F000
heap
page read and write
4598000
trusted library allocation
page read and write
1647000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
E16000
heap
page read and write
DAB000
heap
page read and write
16F5000
heap
page read and write
D98000
heap
page read and write
DFD000
heap
page read and write
3FDD000
heap
page read and write
CC6000
heap
page read and write
1647000
heap
page read and write
A5B000
heap
page read and write
3B000
unkown
page readonly
1BDE000
heap
page read and write
1647000
heap
page read and write
D63000
heap
page read and write
1BE6000
heap
page read and write
9A1000
heap
page read and write
DD6000
heap
page read and write
DD5000
heap
page read and write
D24000
heap
page read and write
DE7000
heap
page read and write
D43000
heap
page read and write
A1B000
heap
page read and write
164F000
heap
page read and write
E32000
heap
page read and write
E5D000
heap
page read and write
1970000
heap
page read and write
A5B000
heap
page read and write
D33000
heap
page read and write
1664000
heap
page read and write
170A000
heap
page read and write
E57000
heap
page read and write
E06000
heap
page read and write
A87000
heap
page read and write
E0A000
heap
page read and write
3B6C000
heap
page read and write
C9B000
heap
page read and write
F8D000
heap
page read and write
25B7C000
heap
page read and write
A76000
heap
page read and write
DF4000
heap
page read and write
E26000
heap
page read and write
172A000
heap
page read and write
1BE6000
heap
page read and write
D24000
heap
page read and write
12BB000
heap
page read and write
177E000
heap
page read and write
C4F000
heap
page read and write
E16000
heap
page read and write
1875000
heap
page read and write
1634000
heap
page read and write
E0C000
heap
page read and write
16FE000
heap
page read and write
A3F000
heap
page read and write
20000
unkown
page readonly
A63000
heap
page read and write
6CFA4000
unkown
page read and write
E45000
heap
page read and write
A78000
heap
page read and write
25B58000
heap
page read and write
BD9000
heap
page read and write
3B61000
heap
page read and write
D65000
heap
page read and write
1647000
heap
page read and write
A1B000
heap
page read and write
1BCA000
heap
page read and write
AED000
heap
page read and write
33B0000
heap
page read and write
158B000
heap
page read and write
1647000
heap
page read and write
930000
heap
page read and write
DF6000
heap
page read and write
1BFF000
heap
page read and write
1888000
heap
page read and write
E0A000
heap
page read and write
A83000
heap
page read and write
1600000
heap
page read and write
F75000
heap
page read and write
E26000
heap
page read and write
E0C000
heap
page read and write
169E000
heap
page read and write
1611000
heap
page read and write
E19000
heap
page read and write
1626000
heap
page read and write
25C2D000
heap
page read and write
70E0000
direct allocation
page read and write
AD0000
heap
page read and write
DF0000
heap
page read and write
D7F000
heap
page read and write
1990000
heap
page read and write
DF0000
heap
page read and write
1538000
heap
page read and write
3E39000
heap
page read and write
771000
heap
page read and write
45000
unkown
page write copy
A83000
heap
page read and write
6CFA9000
unkown
page readonly
5B9000
heap
page read and write
D01000
heap
page read and write
A79000
heap
page read and write
D9A000
heap
page read and write
D60000
heap
page read and write
D34000
heap
page read and write
1BCA000
heap
page read and write
1633000
heap
page read and write
A8F000
heap
page read and write
D8E000
heap
page read and write
E16000
heap
page read and write
DFD000
heap
page read and write
CC2000
heap
page read and write
AD0000
heap
page read and write
E22000
heap
page read and write
E4C000
heap
page read and write
DF6000
heap
page read and write
DAD000
heap
page read and write
1BC6000
heap
page read and write
3D0E000
stack
page read and write
15FE000
heap
page read and write
E2C000
heap
page read and write
3BCC000
heap
page read and write
A5B000
heap
page read and write
1755000
heap
page read and write
19A0000
heap
page read and write
4569000
trusted library allocation
page read and write
E45000
heap
page read and write
D43000
heap
page read and write
75F000
heap
page read and write
E22000
heap
page read and write
A23000
heap
page read and write
A63000
heap
page read and write
18B4000
heap
page read and write
DCC000
heap
page read and write
3BDD000
heap
page read and write
1BFF000
heap
page read and write
A74000
heap
page read and write
1B79000
heap
page read and write
23AC000
heap
page read and write
E0C000
heap
page read and write
39E4000
heap
page read and write
21000
unkown
page execute read
A23000
heap
page read and write
163C000
heap
page read and write
D43000
heap
page read and write
E45000
heap
page read and write
3B4B000
heap
page read and write
C7A000
heap
page read and write
4F43000
direct allocation
page execute and read and write
1655000
heap
page read and write
E45000
heap
page read and write
1850000
heap
page read and write
3BA2000
heap
page read and write
1622000
heap
page read and write
3BBC000
heap
page read and write
19AD000
heap
page read and write
E22000
heap
page read and write
C93000
heap
page read and write
9FC000
heap
page read and write
9E8000
heap
page read and write
A63000
heap
page read and write
C82000
heap
page read and write
D43000
heap
page read and write
6CF31000
unkown
page write copy
171B000
heap
page read and write
58D000
stack
page read and write
E0A000
heap
page read and write
1990000
heap
page read and write
E16000
heap
page read and write
1725000
heap
page read and write
4EDE000
direct allocation
page execute and read and write
4EF3000
direct allocation
page execute and read and write
E0B000
heap
page read and write
15E9000
heap
page read and write
152D000
heap
page read and write
DA9000
heap
page read and write
C82000
heap
page read and write
AD0000
heap
page read and write
1971000
heap
page read and write
C9B000
heap
page read and write
9FC000
heap
page read and write
C83000
heap
page read and write
6CFA9000
unkown
page readonly
1737000
heap
page read and write
E0C000
heap
page read and write
E2A000
heap
page read and write
45B8000
trusted library allocation
page read and write
DC5000
heap
page read and write
3B000
unkown
page readonly
1008000
heap
page read and write
766000
heap
page read and write
D34000
heap
page read and write
DFD000
heap
page read and write
D57000
heap
page read and write
C6E1000
direct allocation
page read and write
17B4000
heap
page read and write
1647000
heap
page read and write
6CAA5000
unkown
page read and write
164F000
heap
page read and write
DBB000
heap
page read and write
1888000
heap
page read and write
90A000
heap
page read and write
3AE8000
trusted library allocation
page read and write
395E000
heap
page read and write
9D0000
unkown
page readonly
1640000
heap
page read and write
6CEF1000
unkown
page execute read
3BA2000
heap
page read and write
DC4000
heap
page read and write
164F000
heap
page read and write
16FD000
heap
page read and write
DF9000
heap
page read and write
D51000
heap
page read and write
E37000
heap
page read and write
D34000
heap
page read and write
3B70000
heap
page read and write
A1B000
heap
page read and write
3AE0000
heap
page read and write
EB0000
heap
page read and write
766000
heap
page read and write
CD1000
heap
page read and write
1898000
heap
page read and write
DD5000
heap
page read and write
1508000
heap
page read and write
E8E000
stack
page read and write
195F000
heap
page read and write
1BFF000
heap
page read and write
DCC000
heap
page read and write
3B8F000
heap
page read and write
172A000
heap
page read and write
A8F000
heap
page read and write
C9B000
heap
page read and write
C82000
heap
page read and write
D89000
heap
page read and write
E0C000
heap
page read and write
622000
heap
page read and write
25B01000
heap
page read and write
1BCA000
heap
page read and write
4598000
trusted library allocation
page read and write
D43000
heap
page read and write
D53000
heap
page read and write
4149000
trusted library allocation
page read and write
D8B000
heap
page read and write
6FDE000
stack
page read and write
1990000
heap
page read and write
DF6000
heap
page read and write
E0C000
heap
page read and write
33E8000
heap
page read and write
AC0000
heap
page read and write
C9B000
heap
page read and write
163C000
heap
page read and write
3AE1000
heap
page read and write
1989000
heap
page read and write
3840000
heap
page read and write
DB3000
heap
page read and write
189C000
heap
page read and write
171B000
heap
page read and write
E16000
heap
page read and write
D24000
heap
page read and write
1238000
heap
page read and write
2A109000
heap
page read and write
DE6000
heap
page read and write
47000
unkown
page write copy
FAD000
stack
page read and write
DC1000
heap
page read and write
73E4000
direct allocation
page read and write
1741000
heap
page read and write
A5B000
heap
page read and write
1836000
heap
page read and write
1300000
heap
page read and write
AA0000
heap
page read and write
DCC000
heap
page read and write
15EE000
heap
page read and write
D01000
heap
page read and write
E06000
heap
page read and write
70D3000
direct allocation
page read and write
D63000
heap
page read and write
3566000
heap
page read and write
21000
unkown
page execute read
4EE2000
direct allocation
page execute and read and write
C9B000
heap
page read and write
20000
unkown
page readonly
1899000
heap
page read and write
1980000
heap
page read and write
1741000
heap
page read and write
1BB4000
heap
page read and write
E4C000
heap
page read and write
766000
heap
page read and write
771000
heap
page read and write
E07000
heap
page read and write
9A0000
heap
page read and write
165D000
heap
page read and write
AD0000
heap
page read and write
E07000
heap
page read and write
1980000
heap
page read and write
A83000
heap
page read and write
160F000
heap
page read and write
DC1000
heap
page read and write
C9B000
heap
page read and write
E0C000
heap
page read and write
6CEF0000
unkown
page readonly
6CFA6000
unkown
page write copy
415000
unkown
page readonly
1640000
heap
page read and write
AD0000
heap
page read and write
1850000
heap
page read and write
DF6000
heap
page read and write
4EDA000
direct allocation
page execute and read and write
1653000
heap
page read and write
D60000
heap
page read and write
45000
unkown
page write copy
1755000
heap
page read and write
D5F000
heap
page read and write
E0A000
heap
page read and write
74F6000
direct allocation
page read and write
139B000
heap
page read and write
D43000
heap
page read and write
CD5000
heap
page read and write
D4F000
heap
page read and write
1602000
heap
page read and write
25BCC000
heap
page read and write
A05000
heap
page read and write
1BB6000
heap
page read and write
DD4000
heap
page read and write
A83000
heap
page read and write
3B24000
heap
page read and write
3BBC000
heap
page read and write
6CFA6000
unkown
page write copy
156E000
heap
page read and write
1660000
heap
page read and write
3B70000
heap
page read and write
1653000
heap
page read and write
637000
heap
page read and write
DE8000
heap
page read and write
15C5000
heap
page read and write
3BD1000
heap
page read and write
164F000
heap
page read and write
E03000
heap
page read and write
20000
unkown
page readonly
D63000
heap
page read and write
2191000
heap
page read and write
1603000
heap
page read and write
D98000
heap
page read and write
DCC000
heap
page read and write
D8B000
heap
page read and write
15EE000
heap
page read and write
E06000
heap
page read and write
DE4000
heap
page read and write
AD0000
heap
page read and write
D03000
heap
page read and write
C9B000
heap
page read and write
495F000
heap
page read and write
D17000
heap
page read and write
E01000
heap
page read and write
DFD000
heap
page read and write
E16000
heap
page read and write
D63000
heap
page read and write
3BDC000
heap
page read and write
163D000
heap
page read and write
E02000
heap
page read and write
C62000
heap
page read and write
D34000
heap
page read and write
E45000
heap
page read and write
E45000
heap
page read and write
442E000
stack
page read and write
D24000
heap
page read and write
A31000
heap
page read and write
A73000
heap
page read and write
1BE6000
heap
page read and write
138C000
heap
page read and write
C6E000
heap
page read and write
33E8000
heap
page read and write
DF6000
heap
page read and write
18A8000
heap
page read and write
A1B000
heap
page read and write
A83000
heap
page read and write
DAB000
heap
page read and write
DFD000
heap
page read and write
1600000
heap
page read and write
AC0000
heap
page read and write
466A000
heap
page read and write
3AB5000
heap
page read and write
1658000
heap
page read and write
C9B000
heap
page read and write
195F000
heap
page read and write
A31000
heap
page read and write
1850000
heap
page read and write
3B000
unkown
page readonly
17DA000
heap
page read and write
4569000
trusted library allocation
page read and write
173B000
heap
page read and write
A20000
heap
page read and write
1013000
heap
page read and write
E1A000
heap
page read and write
1610000
heap
page read and write
A3F000
heap
page read and write
7107000
direct allocation
page read and write
DBB000
heap
page read and write
E03000
heap
page read and write
25D7B000
heap
page read and write
1AE0000
heap
page read and write
C9B000
heap
page read and write
3BDC000
heap
page read and write
45A8000
trusted library allocation
page read and write
1653000
heap
page read and write
DC4000
heap
page read and write
25B0000
direct allocation
page read and write
E0C000
heap
page read and write
134C000
heap
page read and write
1ADE000
heap
page read and write
1BC6000
heap
page read and write
D88000
heap
page read and write
3BCC000
heap
page read and write
DFD000
heap
page read and write
19AD000
heap
page read and write
3B9F000
heap
page read and write
3B6C000
heap
page read and write
1BDA000
heap
page read and write
DC1000
heap
page read and write
E45000
heap
page read and write
D33000
heap
page read and write
164F000
heap
page read and write
D63000
heap
page read and write
5F1000
heap
page read and write
D7B000
heap
page read and write
5F0000
heap
page read and write
CB0000
heap
page read and write
102D000
heap
page read and write
4719000
heap
page read and write
A23000
heap
page read and write
DF6000
heap
page read and write
AC0000
heap
page read and write
C4F000
heap
page read and write
195F000
heap
page read and write
D4F000
heap
page read and write
1653000
heap
page read and write
6CF34000
unkown
page write copy
12C0000
heap
page read and write
A78000
heap
page read and write
172B000
heap
page read and write
DFD000
heap
page read and write
DB2000
heap
page read and write
DCC000
heap
page read and write
13B5000
heap
page read and write
1BDA000
heap
page read and write
D33000
heap
page read and write
152C000
heap
page read and write
3CB9000
heap
page read and write
C7A000
heap
page read and write
E1B000
heap
page read and write
A31000
heap
page read and write
1898000
heap
page read and write
C9B000
heap
page read and write
3B000
unkown
page readonly
1647000
heap
page read and write
D7F000
heap
page read and write
DE4000
heap
page read and write
DF5000
heap
page read and write
6CEF0000
unkown
page readonly
E45000
heap
page read and write
E16000
heap
page read and write
C7A000
heap
page read and write
1750000
heap
page read and write
13FC000
heap
page read and write
14EF000
stack
page read and write
6C850000
unkown
page readonly
E03000
heap
page read and write
D63000
heap
page read and write
C7A000
heap
page read and write
AF0000
heap
page read and write
1310000
heap
page read and write
DCC000
heap
page read and write
E09000
heap
page read and write
15F1000
heap
page read and write
EB9000
heap
page read and write
D45000
heap
page read and write
47000
unkown
page write copy
AC0000
heap
page read and write
C9B000
heap
page read and write
AC0000
heap
page read and write
DD4000
heap
page read and write
16FD000
heap
page read and write
1625000
heap
page read and write
1658000
heap
page read and write
A3F000
heap
page read and write
E16000
heap
page read and write
164F000
heap
page read and write
1725000
heap
page read and write
AD0000
heap
page read and write
DF0000
heap
page read and write
3B8F000
heap
page read and write
C72000
heap
page read and write
E37000
heap
page read and write
CF1000
heap
page read and write
AC0000
heap
page read and write
3B64000
heap
page read and write
DBB000
heap
page read and write
DF6000
heap
page read and write
1664000
heap
page read and write
1815000
heap
page read and write
A1B000
heap
page read and write
2326000
heap
page read and write
45000
unkown
page read and write
DBD000
stack
page read and write
19ED000
heap
page read and write
4D95000
heap
page read and write
7361000
direct allocation
page read and write
E0C000
heap
page read and write
C9B000
heap
page read and write
DCC000
heap
page read and write
6C9B1000
unkown
page execute read
DB2000
heap
page read and write
4F36000
direct allocation
page execute and read and write
DA9000
heap
page read and write
D4A000
heap
page read and write
CD5000
heap
page read and write
162F000
heap
page read and write
161F000
heap
page read and write
D63000
heap
page read and write
DCC000
heap
page read and write
E03000
heap
page read and write
E13000
heap
page read and write
D01000
heap
page read and write
AC0000
heap
page read and write
1647000
heap
page read and write
185EC000
stack
page read and write
C6BF000
direct allocation
page read and write
9AA000
heap
page read and write
A78000
heap
page read and write
DF6000
heap
page read and write
17500000
direct allocation
page read and write
DF0000
heap
page read and write
45000
unkown
page read and write
C9B000
heap
page read and write
E37000
heap
page read and write
DE4000
heap
page read and write
21DF000
stack
page read and write
DCC000
heap
page read and write
E45000
heap
page read and write
DC1000
heap
page read and write
25BF5000
heap
page read and write
D30000
heap
page read and write
6CFA9000
unkown
page readonly
13FB000
heap
page read and write
1008000
heap
page read and write
D43000
heap
page read and write
12C0000
heap
page read and write
2913000
heap
page read and write
17CF000
stack
page read and write
A76000
heap
page read and write
25D77000
heap
page read and write
1634000
heap
page read and write
D49000
heap
page read and write
162E000
heap
page read and write
2420000
heap
page read and write
E0A000
heap
page read and write
3F4D000
heap
page read and write
D43000
heap
page read and write
1647000
heap
page read and write
DF6000
heap
page read and write
E02000
heap
page read and write
E5D000
heap
page read and write
15C4000
heap
page read and write
DCC000
heap
page read and write
D63000
heap
page read and write
A3F000
heap
page read and write
1750000
heap
page read and write
A6E000
stack
page read and write
CC64000
heap
page read and write
AC0000
heap
page read and write
1633000
heap
page read and write
5E8000
heap
page read and write
E03000
heap
page read and write
A8F000
heap
page read and write
AED000
heap
page read and write
E16000
heap
page read and write
D4F000
heap
page read and write
1620000
heap
page read and write
A8F000
heap
page read and write
1BDA000
heap
page read and write
2323000
heap
page read and write
3B000
unkown
page readonly
DBB000
heap
page read and write
17EE000
heap
page read and write
4EA2000
direct allocation
page execute and read and write
E30000
heap
page read and write
1653000
heap
page read and write
CC2000
heap
page read and write
DC1000
heap
page read and write
15BA000
heap
page read and write
1620000
heap
page read and write
FB0000
heap
page read and write
16AC000
heap
page read and write
3A04000
heap
page read and write
189E000
heap
page read and write
DC5000
heap
page read and write
C83000
heap
page read and write
C82000
heap
page read and write
DFD000
heap
page read and write
E16000
heap
page read and write
1744000
heap
page read and write
3B70000
heap
page read and write
D8B6000
heap
page read and write
164F000
heap
page read and write
165E000
heap
page read and write
D4F000
heap
page read and write
16FD000
heap
page read and write
D57000
heap
page read and write
A87000
heap
page read and write
3C92000
heap
page read and write
E0B000
heap
page read and write
CDFD000
heap
page read and write
1BFF000
heap
page read and write
E01000
heap
page read and write
D60000
heap
page read and write
1875000
heap
page read and write
1647000
heap
page read and write
C9B000
heap
page read and write
753000
heap
page read and write
A76000
heap
page read and write
1899000
heap
page read and write
DBB000
heap
page read and write
E26000
heap
page read and write
1664000
heap
page read and write
DA7000
heap
page read and write
2983000
heap
page read and write
1AE5000
heap
page read and write
C7A000
heap
page read and write
401000
unkown
page execute read
E0C000
heap
page read and write
6CBB4000
unkown
page read and write
1BDA000
heap
page read and write
E0C000
heap
page read and write
1634000
heap
page read and write
C82000
heap
page read and write
2E8E000
stack
page read and write
75F000
heap
page read and write
E45000
heap
page read and write
DCC000
heap
page read and write
A05000
heap
page read and write
A83000
heap
page read and write
A8F000
heap
page read and write
E37000
heap
page read and write
F8D000
heap
page read and write
D34000
heap
page read and write
DC8000
heap
page read and write
D8C000
heap
page read and write
20000
unkown
page readonly
DF6000
heap
page read and write
15DB000
heap
page read and write
AC0000
heap
page read and write
E0C000
heap
page read and write
E02000
heap
page read and write
1039000
heap
page read and write
1990000
heap
page read and write
E02000
heap
page read and write
CC2000
heap
page read and write
173A000
heap
page read and write
C7A000
heap
page read and write
16C0000
heap
page read and write
1621000
heap
page read and write
14F0000
heap
page read and write
C82000
heap
page read and write
C93000
heap
page read and write
DC5000
heap
page read and write
21000
unkown
page execute read
28AB000
heap
page read and write
1647000
heap
page read and write
2A186000
heap
page read and write
163C000
heap
page read and write
FB5000
heap
page read and write
1647000
heap
page read and write
1898000
heap
page read and write
D43000
heap
page read and write
A73000
heap
page read and write
1621000
heap
page read and write
17EE000
heap
page read and write
1888000
heap
page read and write
289A000
heap
page read and write
D88000
heap
page read and write
F89000
heap
page read and write
D34000
heap
page read and write
1BFF000
heap
page read and write
1899000
heap
page read and write
375F000
trusted library allocation
page read and write
DD8000
heap
page read and write
DFF000
heap
page read and write
C72000
heap
page read and write
C80000
heap
page read and write
DFD000
heap
page read and write
C82000
heap
page read and write
25CB7000
heap
page read and write
175C000
heap
page read and write
1875000
heap
page read and write
DC1000
heap
page read and write
DFD000
heap
page read and write
A78000
heap
page read and write
DFD000
heap
page read and write
4579000
trusted library allocation
page read and write
AC0000
heap
page read and write
3C2A000
heap
page read and write
DF0000
heap
page read and write
9A3000
heap
page read and write
DAB000
heap
page read and write
D63000
heap
page read and write
164F000
heap
page read and write
E45000
heap
page read and write
E03000
heap
page read and write
D33000
heap
page read and write
1840000
heap
page read and write
45000
unkown
page read and write
E0C000
heap
page read and write
639000
heap
page read and write
A78000
heap
page read and write
25C5D000
heap
page read and write
C9B000
heap
page read and write
DC1000
heap
page read and write
15B0000
heap
page read and write
DFD000
heap
page read and write
3716000
heap
page read and write
DCF000
heap
page read and write
DBB000
heap
page read and write
AD0000
heap
page read and write
35E6000
heap
page read and write
162F000
heap
page read and write
147E000
heap
page read and write
E0C000
heap
page read and write
171D000
heap
page read and write
15AE000
heap
page read and write
D4F000
heap
page read and write
A8F000
heap
page read and write
A79000
heap
page read and write
DB5000
heap
page read and write
E22000
heap
page read and write
42FF000
heap
page read and write
1669000
heap
page read and write
19AD000
heap
page read and write
15B4000
heap
page read and write
CD5000
heap
page read and write
1640000
heap
page read and write
DD4000
heap
page read and write
189E000
heap
page read and write
164F000
heap
page read and write
374E000
stack
page read and write
171A000
heap
page read and write
E03000
heap
page read and write
147B000
heap
page read and write
160F000
heap
page read and write
E0C000
heap
page read and write
1598000
heap
page read and write
E9D000
heap
page read and write
1658000
heap
page read and write
D63000
heap
page read and write
48000
unkown
page readonly
47000
unkown
page write copy
DE8000
heap
page read and write
73F5000
direct allocation
page read and write
670000
heap
page read and write
25CDC000
heap
page read and write
28A3000
heap
page read and write
1720000
heap
page read and write
1829000
heap
page read and write
45A8000
trusted library allocation
page read and write
18E0000
heap
page read and write
DCC000
heap
page read and write
1BDA000
heap
page read and write
1669000
heap
page read and write
6CB00000
unkown
page readonly
6CF2F000
unkown
page read and write
CCC000
heap
page read and write
E0C000
heap
page read and write
D60000
heap
page read and write
E45000
heap
page read and write
D4A000
heap
page read and write
D4A000
heap
page read and write
3B0F000
heap
page read and write
179B7000
heap
page read and write
C7A000
heap
page read and write
C9B000
heap
page read and write
D4A000
heap
page read and write
182E000
heap
page read and write
E03000
heap
page read and write
1BC6000
heap
page read and write
1755000
heap
page read and write
FCC000
heap
page read and write
A87000
heap
page read and write
1BDA000
heap
page read and write
D24000
heap
page read and write
158C000
heap
page read and write
621000
heap
page read and write
D8B000
heap
page read and write
1658000
heap
page read and write
A87000
heap
page read and write
5F0000
heap
page read and write
6CEF1000
unkown
page execute read
C3E000
heap
page read and write
36BE000
heap
page read and write
E0C000
heap
page read and write
39A8000
trusted library allocation
page read and write
1543000
heap
page read and write
A73000
heap
page read and write
DCC000
heap
page read and write
E03000
heap
page read and write
D03000
heap
page read and write
1653000
heap
page read and write
1008000
heap
page read and write
3B70000
heap
page read and write
DF6000
heap
page read and write
E5D000
heap
page read and write
AD0000
heap
page read and write
101F000
heap
page read and write
15DF000
heap
page read and write
AC0000
heap
page read and write
E03000
heap
page read and write
173A000
heap
page read and write
DF6000
heap
page read and write
AD0000
heap
page read and write
1BC6000
heap
page read and write
D11000
heap
page read and write
E0C000
heap
page read and write
A73000
heap
page read and write
DB5000
heap
page read and write
1635000
heap
page read and write
25AAB000
heap
page read and write
DF6000
heap
page read and write
DCC000
heap
page read and write
C9B000
heap
page read and write
8BE000
stack
page read and write
1621000
heap
page read and write
1750000
heap
page read and write
9A0000
heap
page read and write
29DB5000
heap
page read and write
D3A000
heap
page read and write
A3F000
heap
page read and write
3BD4000
heap
page read and write
6CEF1000
unkown
page execute read
3AE2000
heap
page read and write
A3F000
heap
page read and write
DFD000
heap
page read and write
195C000
heap
page read and write
29B8000
heap
page read and write
A8F000
heap
page read and write
9B6000
heap
page read and write
3BCC000
heap
page read and write
E0C000
heap
page read and write
172B000
heap
page read and write
DFE000
heap
page read and write
182E000
heap
page read and write
25B71000
heap
page read and write
1899000
heap
page read and write
1623000
heap
page read and write
DC4000
heap
page read and write
A1B000
heap
page read and write
1630000
heap
page read and write
DC8000
heap
page read and write
E5D000
heap
page read and write
DF6000
heap
page read and write
D8E000
heap
page read and write
D65000
heap
page read and write
D63000
heap
page read and write
980000
heap
page read and write
E0C000
heap
page read and write
E03000
heap
page read and write
18A8000
heap
page read and write
D01000
heap
page read and write
185B000
heap
page read and write
6CF39000
unkown
page read and write
3C12000
heap
page read and write
C699000
direct allocation
page read and write
AD0000
heap
page read and write
163B000
heap
page read and write
D831000
heap
page read and write
73A90000
unkown
page readonly
AD0000
heap
page read and write
E0E000
stack
page read and write
1635000
heap
page read and write
E0A000
heap
page read and write
3ECE000
heap
page read and write
1664000
heap
page read and write
622000
heap
page read and write
E0C000
heap
page read and write
1744000
heap
page read and write
D24000
heap
page read and write
189C000
heap
page read and write
1600000
heap
page read and write
466A000
heap
page read and write
3A60000
heap
page read and write
25C05000
heap
page read and write
CD5000
heap
page read and write
A1B000
heap
page read and write
900000
heap
page read and write
D43000
heap
page read and write
D01000
heap
page read and write
AD0000
heap
page read and write
AD0000
heap
page read and write
3B000
unkown
page readonly
1035000
heap
page read and write
A31000
heap
page read and write
D7B000
heap
page read and write
457F000
trusted library allocation
page read and write
154F000
stack
page read and write
48000
unkown
page readonly
C9B000
heap
page read and write
A23000
heap
page read and write
E37000
heap
page read and write
D37000
heap
page read and write
C93000
heap
page read and write
373F000
heap
page read and write
E06000
heap
page read and write
C82000
heap
page read and write
766000
heap
page read and write
3B50000
heap
page read and write
DFD000
heap
page read and write
E37000
heap
page read and write
DE4000
heap
page read and write
E45000
heap
page read and write
A31000
heap
page read and write
173A000
heap
page read and write
CC2000
heap
page read and write
730000
heap
page read and write
E1B000
heap
page read and write
38BF000
heap
page read and write
1655000
heap
page read and write
1640000
heap
page read and write
1BE6000
heap
page read and write
D43000
heap
page read and write
172B000
heap
page read and write
1990000
heap
page read and write
D48000
heap
page read and write
164F000
heap
page read and write
DBB000
heap
page read and write
1630000
heap
page read and write
3A1F000
heap
page read and write
DE8000
heap
page read and write
170A000
heap
page read and write
18AD000
heap
page read and write
D33000
heap
page read and write
1653000
heap
page read and write
1BDE000
heap
page read and write
457F000
trusted library allocation
page read and write
1620000
heap
page read and write
E32000
heap
page read and write
E05000
heap
page read and write
169D000
heap
page read and write
15BC000
heap
page read and write
1519000
heap
page read and write
E45000
heap
page read and write
170A000
heap
page read and write
D4F000
heap
page read and write
C7A000
heap
page read and write
E01000
heap
page read and write
A73000
heap
page read and write
E07000
heap
page read and write
E03000
heap
page read and write
16FD000
heap
page read and write
AC0000
heap
page read and write
C7A9000
direct allocation
page read and write
171A000
heap
page read and write
E45000
heap
page read and write
1658000
heap
page read and write
DD4000
heap
page read and write
BF1000
heap
page read and write
D33000
heap
page read and write
A3F000
heap
page read and write
48ED000
heap
page read and write
CD1000
heap
page read and write
E45000
heap
page read and write
1634000
heap
page read and write
DF6000
heap
page read and write
C73000
heap
page read and write
DFD000
heap
page read and write
164F000
heap
page read and write
19AD000
heap
page read and write
18AB000
heap
page read and write
400000
unkown
page readonly
E43000
heap
page read and write
4696000
heap
page read and write
21000
unkown
page execute read
371E000
heap
page read and write
1837000
heap
page read and write
DF6000
heap
page read and write
A1B000
heap
page read and write
D65000
heap
page read and write
47000
unkown
page read and write
A63000
heap
page read and write
185B000
heap
page read and write
766000
heap
page read and write
DF6000
heap
page read and write
2403000
heap
page read and write
D51000
heap
page read and write
4715000
heap
page read and write
1647000
heap
page read and write
AB1000
heap
page read and write
DFD000
heap
page read and write
6E460000
unkown
page readonly
163B000
heap
page read and write
E0C000
heap
page read and write
37C8000
trusted library allocation
page read and write
235A000
heap
page read and write
BDE000
heap
page read and write
C7A000
heap
page read and write
1908000
heap
page read and write
E5D000
heap
page read and write
A76000
heap
page read and write
AD0000
heap
page read and write
D43000
heap
page read and write
E03000
heap
page read and write
E07000
heap
page read and write
AD0000
heap
page read and write
C6C6000
direct allocation
page read and write
D34000
heap
page read and write
15AB000
heap
page read and write
D24000
heap
page read and write
16ED000
heap
page read and write
164F000
heap
page read and write
C9B000
heap
page read and write
19B0000
heap
page read and write
1BB6000
heap
page read and write
AC0000
heap
page read and write
D13000
heap
page read and write
1BFF000
heap
page read and write
C69F000
direct allocation
page read and write
E27000
heap
page read and write
15E1000
heap
page read and write
47000
unkown
page read and write
1620000
heap
page read and write
DCC000
heap
page read and write
25A4000
heap
page read and write
24C65000
heap
page read and write
D88000
heap
page read and write
6CAD1000
unkown
page readonly
DD4000
heap
page read and write
FB4000
heap
page read and write
1658000
heap
page read and write
DBB000
heap
page read and write
DCC000
heap
page read and write
1990000
heap
page read and write
DF6000
heap
page read and write
C84000
heap
page read and write
159B000
heap
page read and write
164F000
heap
page read and write
172B000
heap
page read and write
1640000
heap
page read and write
CC1000
heap
page read and write
D24000
heap
page read and write
C8E000
heap
page read and write
A8F000
heap
page read and write
4598000
trusted library allocation
page read and write
D43000
heap
page read and write
DCC000
heap
page read and write
E37000
heap
page read and write
1740000
heap
page read and write
1751000
heap
page read and write
1620000
heap
page read and write
DF6000
heap
page read and write
C5E000
heap
page read and write
DA7000
heap
page read and write
6C7C7000
unkown
page read and write
466A000
heap
page read and write
1755000
heap
page read and write
E1B000
heap
page read and write
E0A000
heap
page read and write
101F000
heap
page read and write
173A000
heap
page read and write
25CC4000
heap
page read and write
12BD000
heap
page read and write
E0A000
heap
page read and write
147A000
heap
page read and write
163C000
heap
page read and write
E0C000
heap
page read and write
D34000
heap
page read and write
6BE000
stack
page read and write
25D24000
heap
page read and write
158E000
stack
page read and write
C83000
heap
page read and write
1721000
heap
page read and write
163B000
heap
page read and write
1603000
heap
page read and write
A87000
heap
page read and write
DFA000
heap
page read and write
19AD000
heap
page read and write
7DD000
heap
page read and write
AD0000
heap
page read and write
25C55000
heap
page read and write
AED000
heap
page read and write
4598000
trusted library allocation
page read and write
1BFF000
heap
page read and write
3960000
heap
page read and write
15FE000
heap
page read and write
D4D000
heap
page read and write
E2BC000
heap
page read and write
1C0F000
heap
page read and write
1736000
heap
page read and write
1026000
heap
page read and write
185AD000
unkown
page read and write
6CBB6000
unkown
page write copy
CBE000
heap
page read and write
E30000
heap
page read and write
1850000
heap
page read and write
2FA0000
unkown
page readonly
D7F000
heap
page read and write
DC1000
heap
page read and write
E45000
heap
page read and write
C9B000
heap
page read and write
1428000
heap
page read and write
4D4E000
stack
page read and write
E07000
heap
page read and write
D65000
heap
page read and write
15B4000
heap
page read and write
7102000
direct allocation
page read and write
1620000
heap
page read and write
DF2000
heap
page read and write
1BC6000
heap
page read and write
C93000
heap
page read and write
12E0000
heap
page read and write
15BF000
heap
page read and write
D63000
heap
page read and write
163C000
heap
page read and write
160F000
heap
page read and write
AD0000
heap
page read and write
1BFF000
heap
page read and write
D53000
heap
page read and write
CD1000
heap
page read and write
164F000
heap
page read and write
E0A000
heap
page read and write
DC1000
heap
page read and write
1653000
heap
page read and write
D37000
heap
page read and write
456F000
trusted library allocation
page read and write
D02000
heap
page read and write
D63000
heap
page read and write
CD1000
heap
page read and write
1611000
heap
page read and write
E16000
heap
page read and write
46F5000
heap
page read and write
E4C000
heap
page read and write
172B000
heap
page read and write
1635000
heap
page read and write
729E000
direct allocation
page read and write
D24000
heap
page read and write
179BE000
heap
page read and write
E0C000
heap
page read and write
160F000
heap
page read and write
15D5000
heap
page read and write
AC0000
heap
page read and write
1658000
heap
page read and write
BB0000
heap
page read and write
1664000
heap
page read and write
C05000
heap
page read and write
E4C000
heap
page read and write
E03000
heap
page read and write
1655000
heap
page read and write
8FD000
stack
page read and write
25D3C000
heap
page read and write
165C000
heap
page read and write
EDA000
heap
page read and write
D57000
heap
page read and write
3378000
heap
page read and write
D3A000
heap
page read and write
640000
heap
page read and write
3759000
trusted library allocation
page read and write
1658000
heap
page read and write
BB1000
heap
page read and write
E0C000
heap
page read and write
DFD000
heap
page read and write
48FB000
heap
page read and write
A73000
heap
page read and write
1899000
heap
page read and write
E37000
heap
page read and write
D8A000
heap
page read and write
A31000
heap
page read and write
3BBC000
heap
page read and write
43FF000
trusted library allocation
page read and write
CDFD000
heap
page read and write
E22000
heap
page read and write
E5D000
heap
page read and write
1B49000
heap
page read and write
D4A000
heap
page read and write
D43000
heap
page read and write
C8F000
stack
page read and write
182E000
heap
page read and write
1BE6000
heap
page read and write
172B000
heap
page read and write
1990000
heap
page read and write
E03000
heap
page read and write
E0C000
heap
page read and write
185B000
heap
page read and write
A83000
heap
page read and write
CD1000
heap
page read and write
400000
unkown
page readonly
E0C000
heap
page read and write
A23000
heap
page read and write
CC2000
heap
page read and write
E16000
heap
page read and write
1820000
heap
page read and write
6CF37000
unkown
page write copy
172E000
heap
page read and write
DF6000
heap
page read and write
D43000
heap
page read and write
1647000
heap
page read and write
E0C000
heap
page read and write
1840000
heap
page read and write
E16000
heap
page read and write
D03000
heap
page read and write
DE4000
heap
page read and write
DD4000
heap
page read and write
F6D000
heap
page read and write
E45000
heap
page read and write
F89E000
direct allocation
page read and write
D3A000
heap
page read and write
3474000
heap
page read and write
D8A000
heap
page read and write
1980000
heap
page read and write
46BD000
heap
page read and write
16F6000
heap
page read and write
E0C000
heap
page read and write
1657000
heap
page read and write
20000
unkown
page readonly
C76000
heap
page read and write
A74000
heap
page read and write
D3A000
heap
page read and write
A31000
heap
page read and write
D9F000
heap
page read and write
A87000
heap
page read and write
A1B000
heap
page read and write
771000
heap
page read and write
6CEF1000
unkown
page execute read
C56000
heap
page read and write
1647000
heap
page read and write
DFD000
heap
page read and write
1703000
heap
page read and write
1BFF000
heap
page read and write
DF0000
heap
page read and write
CD5000
heap
page read and write
4676000
heap
page read and write
2DD000
stack
page read and write
16B1000
heap
page read and write
E26000
heap
page read and write
E03000
heap
page read and write
6CEF1000
unkown
page execute read
1610000
heap
page read and write
DCC000
heap
page read and write
B90000
heap
page read and write
E22000
heap
page read and write
1664000
heap
page read and write
6CF3C000
unkown
page write copy
CC4000
heap
page read and write
138C000
heap
page read and write
4C61000
heap
page read and write
1850000
heap
page read and write
D3A000
heap
page read and write
E0C000
heap
page read and write
1746000
heap
page read and write
DCC000
heap
page read and write
4428000
trusted library allocation
page read and write
A3F000
heap
page read and write
9A0000
heap
page read and write
CD1000
heap
page read and write
E06000
heap
page read and write
4598000
trusted library allocation
page read and write
1634000
heap
page read and write
E4C000
heap
page read and write
E0A000
heap
page read and write
19AD000
heap
page read and write
1BDA000
heap
page read and write
E24000
heap
page read and write
CC6E000
heap
page read and write
DFD000
heap
page read and write
99F000
stack
page read and write
560000
heap
page read and write
E22000
heap
page read and write
C82000
heap
page read and write
C3F000
heap
page read and write
E02000
heap
page read and write
1664000
heap
page read and write
1814000
heap
page read and write
A83000
heap
page read and write
1653000
heap
page read and write
DB7000
heap
page read and write
18A8000
heap
page read and write
9FC000
heap
page read and write
163B000
heap
page read and write
D9C000
heap
page read and write
E4C000
heap
page read and write
FFA000
heap
page read and write
DC1000
heap
page read and write
1749000
heap
page read and write
766000
heap
page read and write
163C000
heap
page read and write
D57000
heap
page read and write
1626000
heap
page read and write
16A4000
heap
page read and write
A8F000
heap
page read and write
6CEF0000
unkown
page readonly
1740000
heap
page read and write
75F000
heap
page read and write
2596B000
heap
page read and write
3B60000
heap
page read and write
D99000
heap
page read and write
C93000
heap
page read and write
E03000
heap
page read and write
D84000
heap
page read and write
195F000
heap
page read and write
D3A000
heap
page read and write
88E000
heap
page read and write
161F000
heap
page read and write
D57000
heap
page read and write
1621000
heap
page read and write
1899000
heap
page read and write
1755000
heap
page read and write
C73000
heap
page read and write
3BDC000
heap
page read and write
DF6000
heap
page read and write
E1E000
heap
page read and write
C9B000
heap
page read and write
CD5000
heap
page read and write
DC1000
heap
page read and write
1640000
heap
page read and write
E63000
heap
page read and write
CB4000
heap
page read and write
3B4B000
heap
page read and write
DF6000
heap
page read and write
1898000
heap
page read and write
25D76000
heap
page read and write
D91000
heap
page read and write
AA3000
heap
page read and write
1610000
heap
page read and write
771000
heap
page read and write
1647000
heap
page read and write
D98000
heap
page read and write
1BB6000
heap
page read and write
C9B000
heap
page read and write
73E1000
direct allocation
page read and write
DFC000
heap
page read and write
E8E000
heap
page read and write
A5B000
heap
page read and write
A3F000
heap
page read and write
2FEE000
heap
page read and write
3BA0000
heap
page read and write
1640000
heap
page read and write
164F000
heap
page read and write
19AD000
heap
page read and write
A31000
heap
page read and write
D88000
heap
page read and write
C72000
heap
page read and write
D43000
heap
page read and write
A5B000
heap
page read and write
DBB000
heap
page read and write
75F000
heap
page read and write
A79000
heap
page read and write
D3A000
heap
page read and write
E37000
heap
page read and write
1990000
heap
page read and write
185B000
heap
page read and write
26E1000
heap
page read and write
E0C000
heap
page read and write
C5D0000
direct allocation
page read and write
1664000
heap
page read and write
DD5000
heap
page read and write
DF0000
heap
page read and write
A23000
heap
page read and write
E03000
heap
page read and write
A87000
heap
page read and write
3BCC000
heap
page read and write
1653000
heap
page read and write
1760000
heap
page read and write
173B000
heap
page read and write
15B7000
heap
page read and write
A8F000
heap
page read and write
DB2000
heap
page read and write
E16000
heap
page read and write
E45000
heap
page read and write
7021000
direct allocation
page read and write
CC2000
heap
page read and write
E59000
heap
page read and write
175C000
heap
page read and write
C82000
heap
page read and write
E26000
heap
page read and write
84E000
stack
page read and write
173A000
heap
page read and write
C72000
heap
page read and write
1875000
heap
page read and write
D4F000
heap
page read and write
1004000
heap
page read and write
DF6000
heap
page read and write
D65000
heap
page read and write
D841000
heap
page read and write
E5D000
heap
page read and write
3481000
heap
page read and write
2496000
heap
page read and write
4676000
heap
page read and write
A63000
heap
page read and write
1B61000
heap
page read and write
DFD000
heap
page read and write
D63000
heap
page read and write
C9B000
heap
page read and write
1BFA000
heap
page read and write
C9B000
heap
page read and write
C82000
heap
page read and write
1838000
heap
page read and write
C72000
heap
page read and write
1653000
heap
page read and write
1875000
heap
page read and write
DAB000
heap
page read and write
E01000
heap
page read and write
C93000
heap
page read and write
1963000
heap
page read and write
A3F000
heap
page read and write
CD5000
heap
page read and write
D27000
heap
page read and write
1301000
heap
page read and write
DB5000
heap
page read and write
CD1000
heap
page read and write
A83000
heap
page read and write
25D24000
heap
page read and write
25CB5000
heap
page read and write
415000
unkown
page readonly
CD1000
heap
page read and write
A87000
heap
page read and write
C61000
heap
page read and write
3D0000
heap
page read and write
3D39000
heap
page read and write
E37000
heap
page read and write
A1B000
heap
page read and write
1BC6000
heap
page read and write
DBB000
heap
page read and write
C6E9000
direct allocation
page read and write
12AF000
stack
page read and write
DF6000
heap
page read and write
E17000
heap
page read and write
55E000
stack
page read and write
C9B000
heap
page read and write
18A8000
heap
page read and write
1BE6000
heap
page read and write
A8F000
heap
page read and write
C93000
heap
page read and write
18B4000
heap
page read and write
4683000
heap
page read and write
DF6000
heap
page read and write
3B94000
heap
page read and write
DF4000
heap
page read and write
3B4B000
heap
page read and write
438000
unkown
page readonly
34E9000
heap
page read and write
C72000
heap
page read and write
DC4000
heap
page read and write
182E000
heap
page read and write
DD8000
heap
page read and write
1035000
heap
page read and write
A1B000
heap
page read and write
D26000
heap
page read and write
60A000
heap
page read and write
E0C000
heap
page read and write
21000
unkown
page execute read
1C0F000
heap
page read and write
DFD000
heap
page read and write
AD0000
heap
page read and write
E1A000
heap
page read and write
1888000
heap
page read and write
1BC6000
heap
page read and write
E4C000
heap
page read and write
3B62000
heap
page read and write
DEA000
heap
page read and write
75F000
heap
page read and write
E37000
heap
page read and write
182E000
heap
page read and write
15DB000
heap
page read and write
A78000
heap
page read and write
DB5000
heap
page read and write
CC2000
heap
page read and write
DE8000
heap
page read and write
A31000
heap
page read and write
E49000
heap
page read and write
DF0000
heap
page read and write
E45000
heap
page read and write
412000
unkown
page write copy
E8E000
heap
page read and write
C9B000
heap
page read and write
46CA000
heap
page read and write
47000
unkown
page read and write
9B0000
heap
page read and write
D24000
heap
page read and write
CD4D000
heap
page read and write
A63000
heap
page read and write
E0C000
heap
page read and write
E16000
heap
page read and write
A8F000
heap
page read and write
D65000
heap
page read and write
C73000
heap
page read and write
DF0000
heap
page read and write
21000
unkown
page execute read
162F000
heap
page read and write
E0C000
heap
page read and write
127E000
heap
page read and write
1BB6000
heap
page read and write
1647000
heap
page read and write
4583000
heap
page read and write
1647000
heap
page read and write
10C3000
heap
page read and write
10CE000
heap
page read and write
AC0000
heap
page read and write
6E47E000
unkown
page readonly
1640000
heap
page read and write
75F000
heap
page read and write
A8F000
heap
page read and write
D83000
heap
page read and write
1BB6000
heap
page read and write
C9B000
heap
page read and write
163B000
heap
page read and write
A31000
heap
page read and write
16CE000
stack
page read and write
E13000
heap
page read and write
623000
heap
page read and write
25B58000
heap
page read and write
1591000
heap
page read and write
A31000
heap
page read and write
1701000
heap
page read and write
DDA000
heap
page read and write
17670000
heap
page read and write
18B4000
heap
page read and write
185B000
heap
page read and write
DFD000
heap
page read and write
E37000
heap
page read and write
18CF2000
heap
page read and write
1BD9000
heap
page read and write
D4F000
heap
page read and write
1856000
heap
page read and write
766000
heap
page read and write
766000
heap
page read and write
E5E000
heap
page read and write
A83000
heap
page read and write
A31000
heap
page read and write
1BC6000
heap
page read and write
D43000
heap
page read and write
DC5000
heap
page read and write
171C000
heap
page read and write
E03000
heap
page read and write
E01000
heap
page read and write
F20000
heap
page read and write
DFD000
heap
page read and write
DFD000
heap
page read and write
C93000
heap
page read and write
186EE000
unkown
page read and write
1647000
heap
page read and write
D77000
heap
page read and write
DB5000
heap
page read and write
154F000
heap
page read and write
C82000
heap
page read and write
1623000
heap
page read and write
DBB000
heap
page read and write
238B000
heap
page read and write
167A000
heap
page read and write
DD4000
heap
page read and write
1818000
heap
page read and write
C73000
heap
page read and write
39E1000
heap
page read and write
1BDA000
heap
page read and write
A1B000
heap
page read and write
D37000
heap
page read and write
2ECE000
stack
page read and write
E0C000
heap
page read and write
AC0000
heap
page read and write
DE4000
heap
page read and write
3B6C000
heap
page read and write
166D000
heap
page read and write
E5D000
heap
page read and write
173A000
heap
page read and write
E1A000
heap
page read and write
E01000
heap
page read and write
D63000
heap
page read and write
E03000
heap
page read and write
C93000
heap
page read and write
C72000
heap
page read and write
E37000
heap
page read and write
E0C000
heap
page read and write
DD5000
heap
page read and write
1850000
heap
page read and write
DB5000
heap
page read and write
2630000
direct allocation
page read and write
48000
unkown
page readonly
6E461000
unkown
page execute read
48000
unkown
page readonly
DCC000
heap
page read and write
164F000
heap
page read and write
A74000
heap
page read and write
9FD000
heap
page read and write
E37000
heap
page read and write
D43000
heap
page read and write
E10000
heap
page read and write
1640000
heap
page read and write
CDD000
heap
page read and write
1647000
heap
page read and write
E03000
heap
page read and write
E0C000
heap
page read and write
1BCA000
heap
page read and write
3B000
unkown
page readonly
3B4C000
heap
page read and write
15C3000
heap
page read and write
1BFF000
heap
page read and write
D3A000
heap
page read and write
C6C000
heap
page read and write
D5F000
heap
page read and write
1623000
heap
page read and write
DFD000
heap
page read and write
25CB9000
heap
page read and write
3666000
heap
page read and write
21000
unkown
page execute read
4696000
heap
page read and write
1653000
heap
page read and write
1BB6000
heap
page read and write
4696000
heap
page read and write
DCC000
heap
page read and write
AD0000
heap
page read and write
DF6000
heap
page read and write
C82000
heap
page read and write
164F000
heap
page read and write
1BE6000
heap
page read and write
3B95000
heap
page read and write
45000
unkown
page read and write
3B000
unkown
page readonly
D33000
heap
page read and write
771000
heap
page read and write
DB2000
heap
page read and write
172B000
heap
page read and write
E0C000
heap
page read and write
D3A000
heap
page read and write
173A000
heap
page read and write
144E000
stack
page read and write
A79000
heap
page read and write
1008000
heap
page read and write
DE8000
heap
page read and write
711E000
direct allocation
page read and write
D48000
heap
page read and write
A83000
heap
page read and write
D63000
heap
page read and write
33EA000
heap
page read and write
D63000
heap
page read and write
2E4E000
stack
page read and write
C9B000
heap
page read and write
1647000
heap
page read and write
C8E000
heap
page read and write
E2A6000
heap
page read and write
AD0000
heap
page read and write
7192000
direct allocation
page read and write
25D3C000
heap
page read and write
C73000
heap
page read and write
457F000
trusted library allocation
page read and write
19AC000
heap
page read and write
E03000
heap
page read and write
D4A000
heap
page read and write
173A000
heap
page read and write
3C0000
heap
page read and write
D5F000
heap
page read and write
1950000
heap
page read and write
D7B000
heap
page read and write
1653000
heap
page read and write
7070000
direct allocation
page read and write
3A85000
heap
page read and write
C82000
heap
page read and write
890000
heap
page read and write
39C2000
heap
page read and write
9F9000
heap
page read and write
173B000
heap
page read and write
1750000
heap
page read and write
170D000
heap
page read and write
106E000
stack
page read and write
A87000
heap
page read and write
CDD000
heap
page read and write
DE8000
heap
page read and write
D5F000
heap
page read and write
A3F000
heap
page read and write
E26000
heap
page read and write
E37000
heap
page read and write
17EA000
heap
page read and write
3C12000
heap
page read and write
1DA6000
heap
page read and write
AD0000
heap
page read and write
E03000
heap
page read and write
DE5000
heap
page read and write
47000
unkown
page read and write
3B8D000
heap
page read and write
1653000
heap
page read and write
47000
unkown
page write copy
AED000
heap
page read and write
2A155000
heap
page read and write
46E5000
heap
page read and write
A23000
heap
page read and write
1600000
heap
page read and write
A0B000
heap
page read and write
E0A000
heap
page read and write
16ED000
heap
page read and write
C9B000
heap
page read and write
1640000
heap
page read and write
1664000
heap
page read and write
E0A000
heap
page read and write
1888000
heap
page read and write
E0A000
heap
page read and write
3889000
heap
page read and write
C82000
heap
page read and write
458D000
heap
page read and write
1875000
heap
page read and write
1621000
heap
page read and write
3C21000
heap
page read and write
1741000
heap
page read and write
E03000
heap
page read and write
E45000
heap
page read and write
A31000
heap
page read and write
D7C000
heap
page read and write
4569000
trusted library allocation
page read and write
6CEF1000
unkown
page execute read
A78000
heap
page read and write
DB2000
heap
page read and write
9AD000
heap
page read and write
1630000
heap
page read and write
D9B000
heap
page read and write
1653000
heap
page read and write
182E000
heap
page read and write
A87000
heap
page read and write
C83000
heap
page read and write
D3C000
heap
page read and write
C93000
heap
page read and write
C82000
heap
page read and write
1620000
heap
page read and write
DA7000
heap
page read and write
A76000
heap
page read and write
19AD000
heap
page read and write
25B7C000
heap
page read and write
6CFA9000
unkown
page readonly
48000
unkown
page readonly
3AF8000
heap
page read and write
D4A000
heap
page read and write
7468000
direct allocation
page read and write
164F000
heap
page read and write
AED000
heap
page read and write
3B000
unkown
page readonly
6C7D1000
unkown
page execute read
CC4000
heap
page read and write
47000
unkown
page write copy
15AA000
heap
page read and write
1008000
heap
page read and write
1653000
heap
page read and write
47000
unkown
page write copy
A1B000
heap
page read and write
A76000
heap
page read and write
164F000
heap
page read and write
1658000
heap
page read and write
DFD000
heap
page read and write
C9B000
heap
page read and write
DF0000
heap
page read and write
3CB8000
heap
page read and write
D63000
heap
page read and write
733F1000
unkown
page execute read
A1B000
heap
page read and write
A8F000
stack
page read and write
372A000
heap
page read and write
1BB6000
heap
page read and write
1623000
heap
page read and write
164F000
heap
page read and write
C9B000
heap
page read and write
3B4B000
heap
page read and write
21000
unkown
page execute read
1653000
heap
page read and write
1623000
heap
page read and write
DC1000
heap
page read and write
CCC000
heap
page read and write
163B000
heap
page read and write
1888000
heap
page read and write
189E000
heap
page read and write
E1A000
heap
page read and write
163B000
heap
page read and write
1875000
heap
page read and write
E37000
heap
page read and write
1BC6000
heap
page read and write
18A8000
heap
page read and write
2320000
heap
page read and write
171A000
heap
page read and write
3B000
unkown
page readonly
E0C000
heap
page read and write
1736000
heap
page read and write
C93000
heap
page read and write
E03000
heap
page read and write
771000
heap
page read and write
172B000
heap
page read and write
1640000
heap
page read and write
A79000
heap
page read and write
D97000
heap
page read and write
CC2000
heap
page read and write
DD5000
heap
page read and write
D42000
heap
page read and write
E5D000
heap
page read and write
D4F000
heap
page read and write
6C9B0000
unkown
page readonly
DC4000
heap
page read and write
DC7000
heap
page read and write
D4F000
heap
page read and write
7B0000
heap
page read and write
1623000
heap
page read and write
DE5000
heap
page read and write
DDE000
heap
page read and write
A23000
heap
page read and write
DD4000
heap
page read and write
E03000
heap
page read and write
C82000
heap
page read and write
C82000
heap
page read and write
1664000
heap
page read and write
DD5000
heap
page read and write
4579000
trusted library allocation
page read and write
D99000
heap
page read and write
1827000
heap
page read and write
109C000
heap
page read and write
20DF000
stack
page read and write
17CFE000
stack
page read and write
39BC000
heap
page read and write
D63000
heap
page read and write
47EA000
heap
page read and write
D4F000
heap
page read and write
CD4B000
heap
page read and write
4530000
heap
page read and write
170A000
heap
page read and write
3DB9000
heap
page read and write
189E000
heap
page read and write
3B4B000
heap
page read and write
D03000
heap
page read and write
E5D000
heap
page read and write
760000
heap
page read and write
7371000
direct allocation
page read and write
E03000
heap
page read and write
16E9000
heap
page read and write
100F000
heap
page read and write
1647000
heap
page read and write
DF6000
heap
page read and write
E291000
heap
page read and write
E03000
heap
page read and write
E0C000
heap
page read and write
E23000
heap
page read and write
F8D000
heap
page read and write
E22000
heap
page read and write
D63000
heap
page read and write
E37000
heap
page read and write
BF5000
heap
page read and write
DCF000
heap
page read and write
DF6000
heap
page read and write
E2A000
heap
page read and write
CDD000
heap
page read and write
1634000
heap
page read and write
DF6000
heap
page read and write
AD0000
heap
page read and write
3721000
heap
page read and write
A5B000
heap
page read and write
E2A000
heap
page read and write
160F000
heap
page read and write
2E5A000
heap
page read and write
C83000
heap
page read and write
E4C000
heap
page read and write
D57000
heap
page read and write
C7A000
heap
page read and write
1899000
heap
page read and write
1888000
heap
page read and write
1691000
heap
page read and write
D4F000
heap
page read and write
C82000
heap
page read and write
21000
unkown
page execute read
25D24000
heap
page read and write
EDA000
heap
page read and write
1600000
heap
page read and write
3B4B000
heap
page read and write
CC2000
heap
page read and write
E0C000
heap
page read and write
1850000
heap
page read and write
185B000
heap
page read and write
DF6000
heap
page read and write
4DC8000
trusted library allocation
page read and write
1647000
heap
page read and write
1647000
heap
page read and write
70BD000
direct allocation
page read and write
1BB6000
heap
page read and write
CC6000
heap
page read and write
E1A000
heap
page read and write
A23000
heap
page read and write
DD5000
heap
page read and write
C7A000
heap
page read and write
1BDA000
heap
page read and write
D53000
heap
page read and write
1653000
heap
page read and write
1BB4000
heap
page read and write
6CFA4000
unkown
page read and write
172E000
heap
page read and write
16F6000
heap
page read and write
15FE000
heap
page read and write
C72000
heap
page read and write
D63000
heap
page read and write
45000
unkown
page write copy
1740000
heap
page read and write
7242000
direct allocation
page read and write
D821000
heap
page read and write
D5F000
heap
page read and write
141A000
heap
page read and write
1658000
heap
page read and write
45000
unkown
page write copy
6E393000
unkown
page readonly
DB3000
heap
page read and write
E03000
heap
page read and write
E02000
heap
page read and write
1658000
heap
page read and write
3C2A000
heap
page read and write
1647000
heap
page read and write
1610000
heap
page read and write
3BDC000
heap
page read and write
48000
unkown
page readonly
38EF000
heap
page read and write
C8E000
heap
page read and write
E0A000
heap
page read and write
E0C000
heap
page read and write
15DB000
heap
page read and write
3BD4000
heap
page read and write
1899000
heap
page read and write
259C000
stack
page read and write
E02000
heap
page read and write
E45000
heap
page read and write
161F000
heap
page read and write
DA8000
heap
page read and write
16FE000
heap
page read and write
1BFF000
heap
page read and write
CDD000
heap
page read and write
1607000
heap
page read and write
D34000
heap
page read and write
D7C000
heap
page read and write
DB5000
heap
page read and write
E4C000
heap
page read and write
E4C000
heap
page read and write
1BB6000
heap
page read and write
1BC6000
heap
page read and write
1647000
heap
page read and write
DD8000
heap
page read and write
E0C000
heap
page read and write
A23000
heap
page read and write
1653000
heap
page read and write
DF6000
heap
page read and write
15FE000
heap
page read and write
D4A000
heap
page read and write
2A189000
heap
page read and write
A3F000
heap
page read and write
1647000
heap
page read and write
3C2B000
heap
page read and write
12EE000
heap
page read and write
3BA9000
heap
page read and write
1BCA000
heap
page read and write
1664000
heap
page read and write
1750000
heap
page read and write
1BDA000
heap
page read and write
1705000
heap
page read and write
A5B000
heap
page read and write
DB4000
heap
page read and write
A73000
heap
page read and write
3877000
heap
page read and write
1BAD000
heap
page read and write
A5B000
heap
page read and write
CDD000
heap
page read and write
C90000
heap
page read and write
E4C000
heap
page read and write
167E000
heap
page read and write
E1A000
heap
page read and write
DD4000
heap
page read and write
AC0000
heap
page read and write
D63000
heap
page read and write
48000
unkown
page readonly
A76000
heap
page read and write
1634000
heap
page read and write
E06000
heap
page read and write
21000
unkown
page execute read
C79A000
direct allocation
page read and write
DF6000
heap
page read and write
DBB000
heap
page read and write
75F000
heap
page read and write
13FC000
heap
page read and write
1888000
heap
page read and write
A63000
heap
page read and write
1653000
heap
page read and write
1840000
heap
page read and write
1BC6000
heap
page read and write
AD0000
heap
page read and write
25CB7000
heap
page read and write
10CA000
heap
page read and write
771000
heap
page read and write
D33000
heap
page read and write
D65000
heap
page read and write
45000
unkown
page read and write
D63000
heap
page read and write
A74000
heap
page read and write
7A0000
heap
page read and write
748B000
direct allocation
page read and write
D24000
heap
page read and write
D4F000
heap
page read and write
E0C000
heap
page read and write
E01000
heap
page read and write
D4F000
heap
page read and write
E0A000
heap
page read and write
189E000
heap
page read and write
D43000
heap
page read and write
E0C000
heap
page read and write
185B000
heap
page read and write
D3A000
heap
page read and write
DB5000
heap
page read and write
A63000
heap
page read and write
D4F000
heap
page read and write
173D000
heap
page read and write
1647000
heap
page read and write
1008000
heap
page read and write
CB1000
heap
page read and write
DC1000
heap
page read and write
E21000
heap
page read and write
E37000
heap
page read and write
A76000
heap
page read and write
1634000
heap
page read and write
DC4000
heap
page read and write
89F000
stack
page read and write
4166000
heap
page read and write
160F000
heap
page read and write
1653000
heap
page read and write
3BA2000
heap
page read and write
D33000
heap
page read and write
D48000
heap
page read and write
DF6000
heap
page read and write
E0C000
heap
page read and write
A8F000
stack
page read and write
A83000
heap
page read and write
CF8000
heap
page read and write
3BA2000
heap
page read and write
E0A000
heap
page read and write
1850000
heap
page read and write
A8F000
heap
page read and write
E17000
heap
page read and write
173FF000
unkown
page read and write
34D000
stack
page read and write
DE4000
heap
page read and write
DFD000
heap
page read and write
E03000
heap
page read and write
196C000
heap
page read and write
E90000
heap
page read and write
3BD4000
heap
page read and write
E5D000
heap
page read and write
DFD000
heap
page read and write
1647000
heap
page read and write
500000
heap
page read and write
17E5000
heap
page read and write
DFD000
heap
page read and write
E5D000
heap
page read and write
45A000
unkown
page readonly
771000
heap
page read and write
1628000
heap
page read and write
1610000
heap
page read and write
1609000
heap
page read and write
167D000
heap
page read and write
1610000
heap
page read and write
401000
unkown
page execute read
E03000
heap
page read and write
48000
unkown
page readonly
DF6000
heap
page read and write
C5C5000
direct allocation
page read and write
E16000
heap
page read and write
6CFA6000
unkown
page write copy
DBB000
heap
page read and write
418B000
heap
page read and write
1888000
heap
page read and write
175C000
heap
page read and write
E37000
heap
page read and write
2FC0000
unkown
page read and write
E51000
heap
page read and write
E16000
heap
page read and write
C93000
heap
page read and write
E5E000
heap
page read and write
1BDE000
heap
page read and write
1610000
heap
page read and write
17A5000
heap
page read and write
3961000
heap
page read and write
AD0000
heap
page read and write
1805000
heap
page read and write
E03000
heap
page read and write
DDA000
heap
page read and write
1BC6000
heap
page read and write
162F000
heap
page read and write
A76000
heap
page read and write
E0A000
heap
page read and write
1647000
heap
page read and write
A73000
heap
page read and write
1640000
heap
page read and write
E22000
heap
page read and write
25C3C000
heap
page read and write
A63000
heap
page read and write
A8F000
heap
page read and write
DFD000
heap
page read and write
E21000
heap
page read and write
17EE000
heap
page read and write
11D0000
heap
page read and write
DE4000
heap
page read and write
D65000
heap
page read and write
102D000
heap
page read and write
E0C000
heap
page read and write
20000
unkown
page readonly
CD5000
heap
page read and write
61E000
heap
page read and write
DF6000
heap
page read and write
C9B000
heap
page read and write
1655000
heap
page read and write
1653000
heap
page read and write
1AE5000
heap
page read and write
1653000
heap
page read and write
25AC3000
heap
page read and write
400000
unkown
page readonly
6CBC0000
unkown
page readonly
AED000
heap
page read and write
C65000
heap
page read and write
C6CF000
direct allocation
page read and write
DC4000
heap
page read and write
241E000
heap
page read and write
AC0000
heap
page read and write
61E000
heap
page read and write
E4C000
heap
page read and write
160B000
heap
page read and write
1755000
heap
page read and write
CC2000
heap
page read and write
1540000
heap
page read and write
D01000
heap
page read and write
3BD4000
heap
page read and write
2FDF000
heap
page read and write
DC5000
heap
page read and write
80E000
stack
page read and write
D4F000
heap
page read and write
3A61000
heap
page read and write
1658000
heap
page read and write
A8F000
heap
page read and write
DFD000
heap
page read and write
DCC000
heap
page read and write
D24000
heap
page read and write
A73000
heap
page read and write
196C000
heap
page read and write
16BE000
heap
page read and write
18A8000
heap
page read and write
1039000
heap
page read and write
3A30000
heap
page read and write
1744000
heap
page read and write
45A000
unkown
page readonly
185B000
heap
page read and write
DFD000
heap
page read and write
162F000
heap
page read and write
A74000
heap
page read and write
21000
unkown
page execute read
415000
unkown
page readonly
75F000
heap
page read and write
1BE6000
heap
page read and write
DCC000
heap
page read and write
D65000
heap
page read and write
D53000
heap
page read and write
3AE1000
heap
page read and write
1610000
heap
page read and write
196C000
heap
page read and write
DCC000
heap
page read and write
1888000
heap
page read and write
1647000
heap
page read and write
DE8000
heap
page read and write
73A96000
unkown
page readonly
18E1000
heap
page read and write
15EF000
heap
page read and write
1980000
heap
page read and write
3B000
unkown
page readonly
D33000
heap
page read and write
A76000
heap
page read and write
1630000
heap
page read and write
11F1000
heap
page read and write
E4C000
heap
page read and write
6CFA4000
unkown
page read and write
E03000
heap
page read and write
1829000
heap
page read and write
158E000
heap
page read and write
5F6000
heap
page read and write
1990000
heap
page read and write
DD4000
heap
page read and write
1BB4000
heap
page read and write
E03000
heap
page read and write
1647000
heap
page read and write
3BB1000
heap
page read and write
18B4000
heap
page read and write
771000
heap
page read and write
AED000
heap
page read and write
48000
unkown
page readonly
18AD000
heap
page read and write
1990000
heap
page read and write
1640000
heap
page read and write
E16000
heap
page read and write
47000
unkown
page write copy
18B4000
heap
page read and write
E1B000
heap
page read and write
3F2E000
stack
page read and write
AD0000
heap
page read and write
44B000
unkown
page read and write
D7B000
heap
page read and write
AC0000
heap
page read and write
20000
unkown
page readonly
DC8000
heap
page read and write
DF0000
heap
page read and write
1751000
heap
page read and write
D4F000
heap
page read and write
DF4000
heap
page read and write
C72000
heap
page read and write
18A8000
heap
page read and write
DC1000
heap
page read and write
39B9000
heap
page read and write
1875000
heap
page read and write
771000
heap
page read and write
1653000
heap
page read and write
1382000
heap
page read and write
174F000
heap
page read and write
1633000
heap
page read and write
C82000
heap
page read and write
195F000
heap
page read and write
DC1000
heap
page read and write
9C4000
heap
page read and write
1610000
heap
page read and write
DFD000
heap
page read and write
75F000
heap
page read and write
D4F000
heap
page read and write
E0C000
heap
page read and write
373E000
heap
page read and write
E45000
heap
page read and write
DFD000
heap
page read and write
E5D000
heap
page read and write
D49000
heap
page read and write
1899000
heap
page read and write
D5F000
heap
page read and write
1008000
heap
page read and write
1633000
heap
page read and write
E0C000
heap
page read and write
E4A000
heap
page read and write
420000
heap
page read and write
1647000
heap
page read and write
1899000
heap
page read and write
D4F000
stack
page read and write
164F000
heap
page read and write
C7A000
heap
page read and write
3BA1000
heap
page read and write
9C0000
heap
page read and write
D03000
heap
page read and write
A31000
heap
page read and write
D3A000
heap
page read and write
DBB000
heap
page read and write
E06000
heap
page read and write
1653000
heap
page read and write
16FD000
heap
page read and write
7438000
direct allocation
page read and write
D63000
heap
page read and write
CD1000
heap
page read and write
1634000
heap
page read and write
DBB000
heap
page read and write
E2A000
heap
page read and write
AD0000
heap
page read and write
A5B000
heap
page read and write
D43000
heap
page read and write
1653000
heap
page read and write
D99000
heap
page read and write
1658000
heap
page read and write
DF6000
heap
page read and write
D95000
heap
page read and write
E5D000
heap
page read and write
A83000
heap
page read and write
E26000
heap
page read and write
DB5000
heap
page read and write
15BC000
heap
page read and write
1793000
heap
page read and write
1653000
heap
page read and write
C72000
heap
page read and write
D8E000
heap
page read and write
AAE000
heap
page read and write
E5E000
heap
page read and write
E5D000
heap
page read and write
DCA000
heap
page read and write
AED000
heap
page read and write
49CD000
direct allocation
page read and write
2F9E000
stack
page read and write
AD0000
heap
page read and write
CBE000
heap
page read and write
E0C000
heap
page read and write
A23000
heap
page read and write
D43000
heap
page read and write
766000
heap
page read and write
C82000
heap
page read and write
6C790000
unkown
page readonly
E03000
heap
page read and write
3BA2000
heap
page read and write
4579000
trusted library allocation
page read and write
E0A000
heap
page read and write
D36000
heap
page read and write
E6A000
heap
page read and write
4598000
trusted library allocation
page read and write
D97000
heap
page read and write
161F000
heap
page read and write
18B4000
heap
page read and write
1653000
heap
page read and write
E32000
heap
page read and write
DE8000
heap
page read and write
DE8000
heap
page read and write
D43000
heap
page read and write
189AC000
stack
page read and write
DF6000
heap
page read and write
DC4000
heap
page read and write
3361000
heap
page read and write
17D1000
heap
page read and write
1980000
heap
page read and write
1647000
heap
page read and write
AD0000
heap
page read and write
DFD000
heap
page read and write
C82000
heap
page read and write
1634000
heap
page read and write
9B000
stack
page read and write
173A000
heap
page read and write
A87000
heap
page read and write
1749000
heap
page read and write
CC1000
heap
page read and write
1634000
heap
page read and write
58A000
heap
page read and write
3AB6000
heap
page read and write
A87000
heap
page read and write
173C000
heap
page read and write
3BE4000
heap
page read and write
CD5000
heap
page read and write
15E1000
heap
page read and write
DF6000
heap
page read and write
A31000
heap
page read and write
D4F000
heap
page read and write
1BB6000
heap
page read and write
C93000
heap
page read and write
D60000
heap
page read and write
D63000
heap
page read and write
D63000
heap
page read and write
2384000
heap
page read and write
25CC3000
heap
page read and write
E45000
heap
page read and write
DF0000
heap
page read and write
A8F000
heap
page read and write
E26000
heap
page read and write
DFD000
heap
page read and write
16E6000
heap
page read and write
D01000
heap
page read and write
1990000
heap
page read and write
C9B000
heap
page read and write
18A8000
heap
page read and write
1750000
heap
page read and write
3BCC000
heap
page read and write
E02000
heap
page read and write
D43000
heap
page read and write
A5B000
heap
page read and write
E02000
heap
page read and write
771000
heap
page read and write
2A199000
heap
page read and write
D97000
heap
page read and write
F6E000
heap
page read and write
C82000
heap
page read and write
12F0000
heap
page read and write
D60000
heap
page read and write
3B70000
heap
page read and write
162F000
heap
page read and write
E03000
heap
page read and write
AD0000
heap
page read and write
D5F000
heap
page read and write
D37000
heap
page read and write
DCC000
heap
page read and write
CC9000
heap
page read and write
AD0000
heap
page read and write
E37000
heap
page read and write
9EC000
heap
page read and write
75F000
heap
page read and write
17E00000
direct allocation
page read and write
A79000
heap
page read and write
C7A000
heap
page read and write
DFD000
heap
page read and write
C569000
direct allocation
page read and write
4683000
heap
page read and write
173B000
heap
page read and write
1BE6000
heap
page read and write
13D1000
heap
page read and write
E10000
heap
page read and write
452D000
stack
page read and write
131F000
heap
page read and write
458F000
trusted library allocation
page read and write
1653000
heap
page read and write
173B000
heap
page read and write
A63000
heap
page read and write
18A8000
heap
page read and write
6CEA0000
unkown
page readonly
72A7000
direct allocation
page read and write
C82000
heap
page read and write
A76000
heap
page read and write
6C7B1000
unkown
page readonly
DFD000
heap
page read and write
16FF000
heap
page read and write
E0C000
heap
page read and write
AAB000
heap
page read and write
DE0000
heap
page read and write
1664000
heap
page read and write
1BEA000
heap
page read and write
C83000
heap
page read and write
164F000
heap
page read and write
15E5000
heap
page read and write
F7D000
heap
page read and write
AC0000
heap
page read and write
12C3000
heap
page read and write
18A8000
heap
page read and write
457F000
trusted library allocation
page read and write
401000
unkown
page execute read
1740000
heap
page read and write
AED000
heap
page read and write
DD4000
heap
page read and write
DAF000
stack
page read and write
173A000
heap
page read and write
164F000
heap
page read and write
E1A000
heap
page read and write
DFD000
heap
page read and write
1323000
heap
page read and write
17E5000
heap
page read and write
D84000
heap
page read and write
18A8000
heap
page read and write
D4F000
heap
page read and write
47000
unkown
page read and write
D4F000
heap
page read and write
3B4B000
heap
page read and write
1600000
heap
page read and write
15FA000
heap
page read and write
A83000
heap
page read and write
CD5000
heap
page read and write
AED000
heap
page read and write
CC2000
heap
page read and write
3B94000
heap
page read and write
17EFD000
direct allocation
page read and write
1740000
heap
page read and write
1001000
heap
page read and write
57D000
stack
page read and write
4569000
trusted library allocation
page read and write
DDF000
heap
page read and write
D37000
heap
page read and write
A7E000
heap
page read and write
16CA000
heap
page read and write
75F000
heap
page read and write
D34000
heap
page read and write
1BB6000
heap
page read and write
25D7B000
heap
page read and write
E16000
heap
page read and write
1633000
heap
page read and write
DC5000
heap
page read and write
E4C000
heap
page read and write
DA7000
heap
page read and write
1640000
heap
page read and write
D03000
heap
page read and write
10C0000
heap
page read and write
E0A000
heap
page read and write
E45000
heap
page read and write
D88000
heap
page read and write
23C8000
heap
page read and write
1647000
heap
page read and write
DC4000
heap
page read and write
A78000
heap
page read and write
DF6000
heap
page read and write
16FD000
heap
page read and write
1609000
heap
page read and write
7332000
direct allocation
page read and write
DBB000
heap
page read and write
DFC000
heap
page read and write
E0C000
heap
page read and write
E45000
heap
page read and write
E16000
heap
page read and write
115B000
heap
page read and write
D81000
heap
page read and write
624000
heap
page read and write
DA7000
heap
page read and write
D03000
heap
page read and write
DE4000
heap
page read and write
DF6000
heap
page read and write
E03000
heap
page read and write
192C000
heap
page read and write
4177000
heap
page read and write
6CFA9000
unkown
page readonly
E16000
heap
page read and write
C93000
heap
page read and write
E37000
heap
page read and write
E37000
heap
page read and write
E0C000
heap
page read and write
E32000
heap
page read and write
E07000
heap
page read and write
15ED000
heap
page read and write
DFD000
heap
page read and write
AD0000
heap
page read and write
D9C000
heap
page read and write
361E000
heap
page read and write
C72000
heap
page read and write
1BB6000
heap
page read and write
167A000
heap
page read and write
C83000
heap
page read and write
E37000
heap
page read and write
AED000
heap
page read and write
1277000
heap
page read and write
AC0000
heap
page read and write
15AE000
heap
page read and write
1899000
heap
page read and write
D01000
heap
page read and write
C9B000
heap
page read and write
1664000
heap
page read and write
D24000
heap
page read and write
1610000
heap
page read and write
D43000
heap
page read and write
D77000
heap
page read and write
25B58000
heap
page read and write
182E000
heap
page read and write
DB5000
heap
page read and write
E07000
heap
page read and write
D6E000
heap
page read and write
1640000
heap
page read and write
1622000
heap
page read and write
45000
unkown
page write copy
BE5000
heap
page read and write
1653000
heap
page read and write
510000
heap
page read and write
E03000
heap
page read and write
1888000
heap
page read and write
15AE000
heap
page read and write
1850000
heap
page read and write
3BA2000
heap
page read and write
15F0000
heap
page read and write
1980000
heap
page read and write
DE5000
heap
page read and write
6CB01000
unkown
page execute read
25BBC000
heap
page read and write
E0C000
heap
page read and write
DE4000
heap
page read and write
15EE000
heap
page read and write
6CEF0000
unkown
page readonly
E03000
heap
page read and write
DB3000
heap
page read and write
172A000
heap
page read and write
25CD5000
heap
page read and write
A83000
heap
page read and write
DE8000
heap
page read and write
3B000
unkown
page readonly
1630000
heap
page read and write
E03000
heap
page read and write
2F40000
heap
page read and write
DF6000
heap
page read and write
E03000
heap
page read and write
1658000
heap
page read and write
3927000
heap
page read and write
E32000
heap
page read and write
440000
heap
page read and write
1980000
heap
page read and write
AED000
heap
page read and write
D5F000
heap
page read and write
A31000
heap
page read and write
73DE000
direct allocation
page read and write
4598000
trusted library allocation
page read and write
C82000
heap
page read and write
771000
heap
page read and write
E03000
heap
page read and write
CDD000
heap
page read and write
18AD000
heap
page read and write
A8F000
heap
page read and write
172B000
heap
page read and write
20000
unkown
page readonly
400000
unkown
page readonly
D4F000
heap
page read and write
CF5000
heap
page read and write
16DD000
heap
page read and write
D53000
heap
page read and write
C91000
heap
page read and write
D65000
heap
page read and write
8E0000
heap
page read and write
E07000
heap
page read and write
A76000
heap
page read and write
C7A000
heap
page read and write
6CFA4000
unkown
page read and write
E5D000
heap
page read and write
DB5000
heap
page read and write
1980000
heap
page read and write
C72000
heap
page read and write
1626000
heap
page read and write
D84000
heap
page read and write
3BDC000
heap
page read and write
18A8000
heap
page read and write
E45000
heap
page read and write
DFD000
heap
page read and write
A3F000
heap
page read and write
1846D000
unkown
page read and write
37C0000
heap
page read and write
A5B000
heap
page read and write
4CE000
stack
page read and write
D33000
heap
page read and write
240A000
heap
page read and write
4676000
heap
page read and write
DD4000
heap
page read and write
D63000
heap
page read and write
C72000
heap
page read and write
3D09000
trusted library allocation
page read and write
E07000
heap
page read and write
189B000
heap
page read and write
DF0000
heap
page read and write
164F000
heap
page read and write
1307000
heap
page read and write
E0C000
heap
page read and write
E37000
heap
page read and write
771000
heap
page read and write
A76000
heap
page read and write
171B000
heap
page read and write
164F000
heap
page read and write
CDD000
heap
page read and write
D7F000
heap
page read and write
DC5000
heap
page read and write
6CEF0000
unkown
page readonly
AD0000
heap
page read and write
DFD000
heap
page read and write
1BB6000
heap
page read and write
D6D000
stack
page read and write
1610000
heap
page read and write
C9B000
heap
page read and write
1BCA000
heap
page read and write
A83000
heap
page read and write
C7A000
heap
page read and write
21000
unkown
page execute read
E03000
heap
page read and write
BAF000
stack
page read and write
1647000
heap
page read and write
DD4000
heap
page read and write
C72000
heap
page read and write
E0C000
heap
page read and write
D48000
heap
page read and write
C82000
heap
page read and write
4676000
heap
page read and write
1630000
heap
page read and write
E37000
heap
page read and write
D4F000
heap
page read and write
D03000
heap
page read and write
9AD000
heap
page read and write
DFD000
heap
page read and write
4589000
trusted library allocation
page read and write
DCC000
heap
page read and write
DC1000
heap
page read and write
A1B000
heap
page read and write
1BC6000
heap
page read and write
75F000
heap
page read and write
1623000
heap
page read and write
C6B4000
direct allocation
page read and write
18B4000
heap
page read and write
E0C000
heap
page read and write
C6F4000
direct allocation
page read and write
1620000
heap
page read and write
4D0000
heap
page read and write
C93000
heap
page read and write
1BB6000
heap
page read and write
383F000
heap
page read and write
9F7000
heap
page read and write
D60000
heap
page read and write
165C000
heap
page read and write
1BE6000
heap
page read and write
73A91000
unkown
page execute read
AC0000
heap
page read and write
9CC000
heap
page read and write
D65000
heap
page read and write
CD5000
heap
page read and write
DF6000
heap
page read and write
DAB000
heap
page read and write
DD4000
heap
page read and write
771000
heap
page read and write
DCC000
heap
page read and write
C82000
heap
page read and write
E0C000
heap
page read and write
DF0000
heap
page read and write
1899000
heap
page read and write
1647000
heap
page read and write
A79000
heap
page read and write
DBB000
heap
page read and write
9B0000
heap
page read and write
D43000
heap
page read and write
171B000
heap
page read and write
1BB6000
heap
page read and write
A5B000
heap
page read and write
4530000
heap
page read and write
172B000
heap
page read and write
36BF000
heap
page read and write
1664000
heap
page read and write
1BB4000
heap
page read and write
FD8000
heap
page read and write
1008000
heap
page read and write
1875000
heap
page read and write
1C30000
heap
page read and write
1990000
heap
page read and write
E0C000
heap
page read and write
E0C000
heap
page read and write
E07000
heap
page read and write
E51000
heap
page read and write
1898000
heap
page read and write
9F7000
heap
page read and write
E0C000
heap
page read and write
E2C000
heap
page read and write
2948000
heap
page read and write
172A000
heap
page read and write
6CF47000
unkown
page write copy
3B60000
heap
page read and write
164F000
heap
page read and write
1BBA000
heap
page read and write
CC2000
heap
page read and write
1A31000
heap
page read and write
DAB000
heap
page read and write
2FBA000
unkown
page readonly
4715000
heap
page read and write
2310000
heap
page read and write
1621000
heap
page read and write
AC0000
heap
page read and write
E0A000
heap
page read and write
C9B000
heap
page read and write
E1A000
heap
page read and write
C9B000
heap
page read and write
E0C000
heap
page read and write
FC0000
heap
page read and write
E16000
heap
page read and write
A7E000
heap
page read and write
37EF000
heap
page read and write
1664000
heap
page read and write
395B000
heap
page read and write
D24000
heap
page read and write
B91000
heap
page read and write
A0F000
heap
page read and write
131E000
heap
page read and write
AD0000
heap
page read and write
E37000
heap
page read and write
4C65000
heap
page read and write
A83000
heap
page read and write
C82000
heap
page read and write
D5F000
heap
page read and write
3B4B000
heap
page read and write
1658000
heap
page read and write
771000
heap
page read and write
1840000
heap
page read and write
173B000
heap
page read and write
A83000
heap
page read and write
1620000
heap
page read and write
E37000
heap
page read and write
88A000
heap
page read and write
D34000
heap
page read and write
3FCE000
heap
page read and write
196E000
heap
page read and write
DFD000
heap
page read and write
D43000
heap
page read and write
CC2000
heap
page read and write
D88000
heap
page read and write
395D000
heap
page read and write
AF0000
heap
page read and write
A83000
heap
page read and write
D63000
heap
page read and write
1653000
heap
page read and write
19AD000
heap
page read and write
E03000
heap
page read and write
12C0000
heap
page read and write
1008000
heap
page read and write
D53000
heap
page read and write
C9B000
heap
page read and write
FF0000
heap
page read and write
E17000
heap
page read and write
AD0000
heap
page read and write
CC2000
heap
page read and write
C9B000
heap
page read and write
E00000
heap
page read and write
6CEF0000
unkown
page readonly
CC1000
heap
page read and write
D4F000
heap
page read and write
DAA000
heap
page read and write
1751000
heap
page read and write
74B000
heap
page read and write
C9B000
heap
page read and write
E02000
heap
page read and write
175C000
heap
page read and write
1990000
heap
page read and write
18AD000
heap
page read and write
1600000
heap
page read and write
2980000
heap
page read and write
1633000
heap
page read and write
1630000
heap
page read and write
E45000
heap
page read and write
C7E000
heap
page read and write
E5D000
heap
page read and write
3B55000
heap
page read and write
18AD000
heap
page read and write
A63000
heap
page read and write
18AD000
heap
page read and write
1747000
heap
page read and write
A76000
heap
page read and write
1750000
heap
page read and write
171A000
heap
page read and write
AC0000
heap
page read and write
E03000
heap
page read and write
AED000
heap
page read and write
163C000
heap
page read and write
75F000
heap
page read and write
DD5000
heap
page read and write
1BCA000
heap
page read and write
1664000
heap
page read and write
C06000
heap
page read and write
6CEF1000
unkown
page execute read
75E000
stack
page read and write
E2C3000
heap
page read and write
6CFA4000
unkown
page read and write
20000
unkown
page readonly
AC0000
heap
page read and write
D60000
heap
page read and write
189E000
heap
page read and write
C83000
heap
page read and write
1602000
heap
page read and write
3B65000
heap
page read and write
19AD000
heap
page read and write
A87000
heap
page read and write
D34000
heap
page read and write
A78000
heap
page read and write
20000
unkown
page readonly
47000
unkown
page read and write
DFD000
heap
page read and write
1898000
heap
page read and write
6CFA4000
unkown
page read and write
DC4000
heap
page read and write
1896E000
direct allocation
page read and write
1664000
heap
page read and write
360F000
stack
page read and write
C82000
heap
page read and write
1621000
heap
page read and write
DD4000
heap
page read and write
DA7000
heap
page read and write
DCC000
heap
page read and write
1BC6000
heap
page read and write
1BCA000
heap
page read and write
C83000
heap
page read and write
771000
heap
page read and write
1647000
heap
page read and write
908000
heap
page read and write
173E000
heap
page read and write
393E000
stack
page read and write
1396000
heap
page read and write
6C7C9000
unkown
page readonly
47000
unkown
page read and write
70FF000
direct allocation
page read and write
1875000
heap
page read and write
C82000
heap
page read and write
1875000
heap
page read and write
15F4000
heap
page read and write
1631000
heap
page read and write
45000
unkown
page read and write
DF6000
heap
page read and write
164F000
heap
page read and write
173A000
heap
page read and write
2A188000
heap
page read and write
173B000
heap
page read and write
4598000
trusted library allocation
page read and write
A8F000
heap
page read and write
412000
unkown
page write copy
1613000
heap
page read and write
1607000
heap
page read and write
D88000
heap
page read and write
E21000
heap
page read and write
DFD000
heap
page read and write
1640000
heap
page read and write
C72000
heap
page read and write
DD4000
heap
page read and write
1473000
heap
page read and write
4A8C000
heap
page read and write
DFD000
heap
page read and write
D43000
heap
page read and write
1BDE000
heap
page read and write
171B000
heap
page read and write
DF6000
heap
page read and write
D03000
heap
page read and write
E06000
heap
page read and write
C93000
heap
page read and write
17E7000
heap
page read and write
12BB000
heap
page read and write
DAE000
heap
page read and write
DA9000
heap
page read and write
DE4000
heap
page read and write
742D000
direct allocation
page read and write
182E000
heap
page read and write
E03000
heap
page read and write
1BCA000
heap
page read and write
25D5E000
heap
page read and write
3DD000
stack
page read and write
DFD000
heap
page read and write
D33000
heap
page read and write
185B000
heap
page read and write
40F000
unkown
page readonly
15F7000
heap
page read and write
A23000
heap
page read and write
C9B000
heap
page read and write
1BCA000
heap
page read and write
1744000
heap
page read and write
E37000
heap
page read and write
DC5000
heap
page read and write
18A8000
heap
page read and write
1736000
heap
page read and write
D97000
heap
page read and write
CD4C000
heap
page read and write
CDD000
heap
page read and write
1BE6000
heap
page read and write
E06000
heap
page read and write
1BCA000
heap
page read and write
E01000
heap
page read and write
1888000
heap
page read and write
E0C000
heap
page read and write
1964000
heap
page read and write
D63000
heap
page read and write
CD61000
heap
page read and write
DF8000
heap
page read and write
7040000
direct allocation
page read and write
CF4000
heap
page read and write
D43000
heap
page read and write
D4F000
heap
page read and write
185B000
heap
page read and write
D89000
heap
page read and write
A87000
heap
page read and write
A7E000
heap
page read and write
1898000
heap
page read and write
D3A000
heap
page read and write
E03000
heap
page read and write
1610000
heap
page read and write
766000
heap
page read and write
1990000
heap
page read and write
A63000
heap
page read and write
1BA1000
heap
page read and write
CDD000
heap
page read and write
3B30000
heap
page read and write
D63000
heap
page read and write
25D3C000
heap
page read and write
E03000
heap
page read and write
DDC000
heap
page read and write
E0C000
heap
page read and write
164F000
heap
page read and write
C72000
heap
page read and write
580000
heap
page read and write
5F5000
heap
page read and write
3BA1000
heap
page read and write
E5D000
heap
page read and write
20000
unkown
page readonly
9C7000
heap
page read and write
1875000
heap
page read and write
A8F000
heap
page read and write
CBE000
heap
page read and write
1653000
heap
page read and write
23FB000
heap
page read and write
18A3000
heap
page read and write
E5D000
heap
page read and write
E07000
heap
page read and write
D34000
heap
page read and write
3BA0000
heap
page read and write
D9C000
heap
page read and write
D63000
heap
page read and write
173B000
heap
page read and write
6C7D0000
unkown
page readonly
39E0000
heap
page read and write
DC5000
heap
page read and write
D43000
heap
page read and write
D4A000
heap
page read and write
C82000
heap
page read and write
4696000
heap
page read and write
162B000
heap
page read and write
21000
unkown
page execute read
AD0000
heap
page read and write
1750000
heap
page read and write
1875000
heap
page read and write
1899000
heap
page read and write
A5B000
heap
page read and write
1BB6000
heap
page read and write
580000
heap
page read and write
A31000
heap
page read and write
C73000
heap
page read and write
1803F000
unkown
page read and write
C72000
heap
page read and write
D48000
heap
page read and write
A1B000
heap
page read and write
D48000
heap
page read and write
D8C000
heap
page read and write
D24000
heap
page read and write
DD4000
heap
page read and write
1620000
heap
page read and write
456F000
trusted library allocation
page read and write
CC2000
heap
page read and write
8BF000
stack
page read and write
3B8F000
heap
page read and write
173A000
heap
page read and write
456F000
trusted library allocation
page read and write
D53000
heap
page read and write
E02000
heap
page read and write
AD0000
heap
page read and write
DB9000
heap
page read and write
19AD000
heap
page read and write
163B000
heap
page read and write
D4A000
heap
page read and write
1035000
heap
page read and write
D5F000
heap
page read and write
E37000
heap
page read and write
CD5000
heap
page read and write
3BDC000
heap
page read and write
CC2000
heap
page read and write
48000
unkown
page readonly
1BB6000
heap
page read and write
C72000
heap
page read and write
766000
heap
page read and write
DAA000
heap
page read and write
A87000
heap
page read and write
3BDC000
heap
page read and write
DE8000
heap
page read and write
25D3C000
heap
page read and write
DC4000
heap
page read and write
13D3000
heap
page read and write
C4A000
heap
page read and write
E4C000
heap
page read and write
1A5D000
heap
page read and write
172A000
heap
page read and write
1840000
heap
page read and write
171A000
heap
page read and write
E5D000
heap
page read and write
DCC000
heap
page read and write
3B94000
heap
page read and write
E5D000
heap
page read and write
A0C000
heap
page read and write
C82000
heap
page read and write
189C000
heap
page read and write
1647000
heap
page read and write
1A04000
heap
page read and write
E06000
heap
page read and write
D03000
heap
page read and write
1898000
heap
page read and write
D01000
heap
page read and write
DC8000
heap
page read and write
4569000
trusted library allocation
page read and write
1614000
heap
page read and write
A76000
heap
page read and write
D3A000
heap
page read and write
1818000
heap
page read and write
58E000
heap
page read and write
2558000
trusted library allocation
page read and write
D53000
heap
page read and write
1BB6000
heap
page read and write
164F000
heap
page read and write
A87000
heap
page read and write
766000
heap
page read and write
E0C000
heap
page read and write
1041000
heap
page read and write
E03000
heap
page read and write
DB5000
heap
page read and write
E03000
heap
page read and write
16EB000
heap
page read and write
F8D000
heap
page read and write
160B000
heap
page read and write
766000
heap
page read and write
C7A000
heap
page read and write
19AD000
heap
page read and write
A31000
heap
page read and write
DF0000
heap
page read and write
1BB6000
heap
page read and write
6CEF0000
unkown
page readonly
DD4000
heap
page read and write
E11000
heap
page read and write
189E000
heap
page read and write
1836000
heap
page read and write
15AE000
heap
page read and write
C16000
heap
page read and write
152A000
heap
page read and write
E37000
heap
page read and write
CD5000
heap
page read and write
1BFF000
heap
page read and write
E37000
heap
page read and write
9E5000
heap
page read and write
6CBB9000
unkown
page readonly
E13000
heap
page read and write
E16000
heap
page read and write
196C000
heap
page read and write
CCA000
heap
page read and write
A1B000
heap
page read and write
1A85000
heap
page read and write
AD0000
heap
page read and write
DAC000
heap
page read and write
A76000
heap
page read and write
159D000
heap
page read and write
E06000
heap
page read and write
4911000
heap
page read and write
D53000
heap
page read and write
D3C000
heap
page read and write
1658000
heap
page read and write
A83000
heap
page read and write
E0C000
heap
page read and write
1662000
heap
page read and write
19B0000
heap
page read and write
A1B000
heap
page read and write
DC4000
heap
page read and write
172B000
heap
page read and write
1BB6000
heap
page read and write
1750000
heap
page read and write
D63000
heap
page read and write
1B11000
heap
page read and write
370E000
heap
page read and write
D1F000
heap
page read and write
DFA000
heap
page read and write
1633000
heap
page read and write
6CBC1000
unkown
page execute read
1736000
heap
page read and write
1600000
heap
page read and write
E03000
heap
page read and write
6C791000
unkown
page execute read
E37000
heap
page read and write
1ACE000
heap
page read and write
E2A000
heap
page read and write
3C23000
heap
page read and write
173A000
heap
page read and write
1BFF000
heap
page read and write
DC1000
heap
page read and write
1BCA000
heap
page read and write
E5D000
heap
page read and write
12BD000
heap
page read and write
A8F000
heap
page read and write
C93000
heap
page read and write
C9B000
heap
page read and write
AD0000
heap
page read and write
E5E000
heap
page read and write
DF6000
heap
page read and write
A73000
heap
page read and write
3C57000
heap
page read and write
6CEF1000
unkown
page execute read
159B000
heap
page read and write
C7A000
heap
page read and write
163C000
heap
page read and write
25C85000
heap
page read and write
3B8F000
heap
page read and write
E0C000
heap
page read and write
E0C000
heap
page read and write
C82000
heap
page read and write
6CFA6000
unkown
page write copy
45A8000
trusted library allocation
page read and write
C83000
heap
page read and write
DFD000
heap
page read and write
3B64000
heap
page read and write
1653000
heap
page read and write
DD5000
heap
page read and write
DD4000
heap
page read and write
DD5000
heap
page read and write
D24000
heap
page read and write
1564000
heap
page read and write
DD4000
heap
page read and write
48000
unkown
page readonly
12BD000
heap
page read and write
D48000
heap
page read and write
164F000
heap
page read and write
D84000
heap
page read and write
A73000
heap
page read and write
165C000
heap
page read and write
985000
heap
page read and write
1914000
heap
page read and write
D43000
heap
page read and write
D60000
heap
page read and write
E20000
heap
page read and write
DCC000
heap
page read and write
DCC000
heap
page read and write
173A000
heap
page read and write
37A3000
heap
page read and write
1653000
heap
page read and write
1898000
heap
page read and write
1664000
heap
page read and write
1600000
heap
page read and write
E03000
heap
page read and write
E0A000
heap
page read and write
B8F000
stack
page read and write
75F000
heap
page read and write
A31000
heap
page read and write
AD0000
heap
page read and write
A83000
heap
page read and write
1701000
heap
page read and write
13EE000
stack
page read and write
45A8000
trusted library allocation
page read and write
C3B000
heap
page read and write
20000
unkown
page readonly
C5E2000
direct allocation
page read and write
1B66000
heap
page read and write
DE8000
heap
page read and write
1BDE000
heap
page read and write
C9B000
heap
page read and write
D43000
heap
page read and write
A73000
heap
page read and write
DE4000
heap
page read and write
DF6000
heap
page read and write
AB1000
heap
page read and write
DBB000
heap
page read and write
AC0000
heap
page read and write
C93000
heap
page read and write
1640000
heap
page read and write
C9B000
heap
page read and write
DF1000
heap
page read and write
CC1000
heap
page read and write
16FD000
heap
page read and write
AC0000
heap
page read and write
1980000
heap
page read and write
DF6000
heap
page read and write
D3C000
heap
page read and write
D9A000
heap
page read and write
FE8000
heap
page read and write
D33000
heap
page read and write
D60000
heap
page read and write
E0A000
heap
page read and write
DBB000
heap
page read and write
1658000
heap
page read and write
1BE6000
heap
page read and write
C05000
heap
page read and write
25AC3000
heap
page read and write
3AB4000
heap
page read and write
DFA000
heap
page read and write
CDFD000
heap
page read and write
1BCA000
heap
page read and write
D97000
heap
page read and write
185B000
heap
page read and write
1BC6000
heap
page read and write
C93000
heap
page read and write
1840000
heap
page read and write
15ED000
heap
page read and write
6CF68000
unkown
page readonly
18A8000
heap
page read and write
A0E000
stack
page read and write
D43000
heap
page read and write
1BC6000
heap
page read and write
E45000
heap
page read and write
18F8000
heap
page read and write
1875000
heap
page read and write
E2C000
heap
page read and write
DF6000
heap
page read and write
AD0000
heap
page read and write
1990000
heap
page read and write
E0A000
heap
page read and write
A76000
heap
page read and write
D34000
heap
page read and write
D82000
heap
page read and write
A31000
heap
page read and write
A50000
heap
page read and write
185B000
heap
page read and write
40F000
unkown
page readonly
1658000
heap
page read and write
E4C000
heap
page read and write
161F000
heap
page read and write
456F000
trusted library allocation
page read and write
12C0000
heap
page read and write
E0C000
heap
page read and write
D34000
heap
page read and write
16F3000
heap
page read and write
4696000
heap
page read and write
1647000
heap
page read and write
20000
unkown
page readonly
1630000
heap
page read and write
20000
unkown
page readonly
45000
unkown
page read and write
C93000
heap
page read and write
A79000
heap
page read and write
A5B000
heap
page read and write
CD1000
heap
page read and write
1640000
heap
page read and write
E22000
heap
page read and write
AD0000
heap
page read and write
E02000
heap
page read and write
732A000
direct allocation
page read and write
45000
unkown
page read and write
D34000
heap
page read and write
E284000
heap
page read and write
73402000
unkown
page readonly
19AD000
heap
page read and write
184AE000
stack
page read and write
E80000
heap
page read and write
E07000
heap
page read and write
D48000
heap
page read and write
25D77000
heap
page read and write
CD5000
heap
page read and write
185B000
heap
page read and write
19AD000
heap
page read and write
3B64000
heap
page read and write
C83000
heap
page read and write
1607000
heap
page read and write
DFD000
heap
page read and write
25BAD000
heap
page read and write
D3A000
heap
page read and write
6CFA9000
unkown
page readonly
DF6000
heap
page read and write
1760000
heap
page read and write
192000
unkown
page read and write
3B000
unkown
page readonly
E5D000
heap
page read and write
1630000
heap
page read and write
1653000
heap
page read and write
7CB000
heap
page read and write
AD0000
heap
page read and write
D08000
heap
page read and write
19AD000
heap
page read and write
1647000
heap
page read and write
1633000
heap
page read and write
D7F000
heap
page read and write
15C4000
heap
page read and write
401000
unkown
page execute read
6CEF0000
unkown
page readonly
A5B000
heap
page read and write
469D000
heap
page read and write
167A000
heap
page read and write
1700000
heap
page read and write
D34000
heap
page read and write
D34000
heap
page read and write
1850000
heap
page read and write
163C000
heap
page read and write
25B61000
heap
page read and write
2A209000
heap
page read and write
DF6000
heap
page read and write
3E2F000
stack
page read and write
C72000
heap
page read and write
D63000
heap
page read and write
E07000
heap
page read and write
175C000
heap
page read and write
A8F000
heap
page read and write
45000
unkown
page write copy
164F000
heap
page read and write
D43000
heap
page read and write
1BDA000
heap
page read and write
47000
unkown
page read and write
1B8D000
heap
page read and write
3B29000
heap
page read and write
1944000
heap
page read and write
DF6000
heap
page read and write
E0C000
heap
page read and write
A87000
heap
page read and write
DF4000
heap
page read and write
16A9000
heap
page read and write
4589000
trusted library allocation
page read and write
D3F000
heap
page read and write
1630000
heap
page read and write
E0A000
heap
page read and write
DC5000
heap
page read and write
DC1000
heap
page read and write
173A000
heap
page read and write
D43000
heap
page read and write
DD4000
heap
page read and write
DF6000
heap
page read and write
1888000
heap
page read and write
D84000
heap
page read and write
C82000
heap
page read and write
3DC8000
heap
page read and write
DE5000
heap
page read and write
A87000
heap
page read and write
173B000
heap
page read and write
28A8000
heap
page read and write
240E000
heap
page read and write
1620000
heap
page read and write
1750000
heap
page read and write
1BDA000
heap
page read and write
C83000
heap
page read and write
DF5000
heap
page read and write
1660000
heap
page read and write
3B000
unkown
page readonly
E5D000
heap
page read and write
1647000
heap
page read and write
171A000
heap
page read and write
17F3E000
stack
page read and write
C93000
heap
page read and write
DF6000
heap
page read and write
160F000
heap
page read and write
A8F000
heap
page read and write
18AEE000
stack
page read and write
A87000
heap
page read and write
1653000
heap
page read and write
1898000
heap
page read and write
164F000
heap
page read and write
D63000
heap
page read and write
102D000
heap
page read and write
1750000
heap
page read and write
E03000
heap
page read and write
173B000
heap
page read and write
E0C000
heap
page read and write
D34000
heap
page read and write
196C000
heap
page read and write
185B000
heap
page read and write
1621000
heap
page read and write
DD5000
heap
page read and write
C51000
heap
page read and write
1840000
heap
page read and write
E0C000
heap
page read and write
E06000
heap
page read and write
E37000
heap
page read and write
1653000
heap
page read and write
C83000
heap
page read and write
88E000
heap
page read and write
5D0000
heap
page read and write
DC1000
heap
page read and write
15B7000
heap
page read and write
E5E000
heap
page read and write
C82000
heap
page read and write
1D0000
heap
page read and write
D8E000
heap
page read and write
36FE000
heap
page read and write
A63000
heap
page read and write
E4F000
heap
page read and write
DF6000
heap
page read and write
C73000
heap
page read and write
AC0000
heap
page read and write
E0C000
heap
page read and write
713C000
direct allocation
page read and write
D63000
heap
page read and write
25CCD000
heap
page read and write
C6B8000
direct allocation
page read and write
E0C000
heap
page read and write
47000
unkown
page write copy
A8F000
heap
page read and write
171A000
heap
page read and write
3B000
unkown
page readonly
CD1000
heap
page read and write
164F000
heap
page read and write
D34000
heap
page read and write
3752000
heap
page read and write
D8E000
heap
page read and write
A87000
heap
page read and write
A23000
heap
page read and write
D4F000
heap
page read and write
E16000
heap
page read and write
DCC000
heap
page read and write
DFD000
heap
page read and write
A87000
heap
page read and write
16FE000
heap
page read and write
E32000
heap
page read and write
D48000
heap
page read and write
1BCA000
heap
page read and write
E37000
heap
page read and write
3696000
heap
page read and write
3B6C000
heap
page read and write
1BB6000
heap
page read and write
C9B000
heap
page read and write
18DF0000
trusted library allocation
page read and write
5E0000
heap
page read and write
1BE6000
heap
page read and write
1BC6000
heap
page read and write
3B4E000
heap
page read and write
C93000
heap
page read and write
165E000
heap
page read and write
397F000
trusted library allocation
page read and write
412F000
stack
page read and write
D3A000
heap
page read and write
1413000
heap
page read and write
A23000
heap
page read and write
E0C000
heap
page read and write
C7A000
heap
page read and write
1640000
heap
page read and write
1755000
heap
page read and write
E45000
heap
page read and write
185B000
heap
page read and write
1380000
heap
page read and write
172B000
heap
page read and write
1B59000
heap
page read and write
D3A000
heap
page read and write
AED000
heap
page read and write
E01000
heap
page read and write
E19000
heap
page read and write
2FA1000
unkown
page execute read
D98000
heap
page read and write
1021000
heap
page read and write
1B0D000
heap
page read and write
AC0000
heap
page read and write
1840000
heap
page read and write
DE8000
heap
page read and write
DB3000
heap
page read and write
DCC000
heap
page read and write
D48000
heap
page read and write
771000
heap
page read and write
1850000
heap
page read and write
189F000
heap
page read and write
1BCA000
heap
page read and write
C93000
heap
page read and write
3B94000
heap
page read and write
E03000
heap
page read and write
1628000
heap
page read and write
D26000
heap
page read and write
3B000
unkown
page readonly
480000
heap
page read and write
E0C000
heap
page read and write
1410000
heap
page read and write
16F5000
heap
page read and write
1356000
heap
page read and write
E2A000
heap
page read and write
D63000
heap
page read and write
A0E000
stack
page read and write
16F4000
heap
page read and write
170B000
heap
page read and write
C8B000
heap
page read and write
E5E000
heap
page read and write
D65000
heap
page read and write
16B9000
heap
page read and write
D84000
heap
page read and write
C72000
heap
page read and write
182A000
heap
page read and write
161F000
heap
page read and write
A31000
heap
page read and write
164F000
heap
page read and write
C83000
heap
page read and write
1828000
heap
page read and write
1BFF000
heap
page read and write
D3A000
heap
page read and write
C93000
heap
page read and write
1647000
heap
page read and write
75F000
heap
page read and write
DFD000
heap
page read and write
1634000
heap
page read and write
AC0000
heap
page read and write
1652000
heap
page read and write
13FB000
heap
page read and write
189C000
heap
page read and write
A8F000
heap
page read and write
1BCA000
heap
page read and write
C7A000
heap
page read and write
1888000
heap
page read and write
D24000
heap
page read and write
DE8000
heap
page read and write
A3F000
heap
page read and write
1788000
heap
page read and write
1640000
heap
page read and write
D03000
heap
page read and write
350E000
stack
page read and write
19AE000
heap
page read and write
D7B000
heap
page read and write
D5F000
heap
page read and write
D60000
heap
page read and write
D24000
heap
page read and write
E0C000
heap
page read and write
E02000
heap
page read and write
466A000
heap
page read and write
C5D5000
direct allocation
page read and write
D43000
heap
page read and write
15B4000
heap
page read and write
C9B000
heap
page read and write
D24000
heap
page read and write
D9E000
heap
page read and write
E4C000
heap
page read and write
100A000
heap
page read and write
1BE6000
heap
page read and write
771000
heap
page read and write
A1B000
heap
page read and write
D60000
heap
page read and write
EFE000
stack
page read and write
252F000
trusted library allocation
page read and write
170A000
heap
page read and write
178BF000
unkown
page read and write
E22000
heap
page read and write
1990000
heap
page read and write
163B000
heap
page read and write
1990000
heap
page read and write
1BCA000
heap
page read and write
E45000
heap
page read and write
3E89000
heap
page read and write
A83000
heap
page read and write
A83000
heap
page read and write
E0C000
heap
page read and write
1898000
heap
page read and write
E4E000
heap
page read and write
C72000
heap
page read and write
6CFA4000
unkown
page read and write
1875000
heap
page read and write
D63000
heap
page read and write
DF6000
heap
page read and write
C6B0000
direct allocation
page read and write
E22000
heap
page read and write
CDD000
heap
page read and write
D24000
heap
page read and write
DC1000
heap
page read and write
17A9000
heap
page read and write
402F000
stack
page read and write
1805000
heap
page read and write
D57000
heap
page read and write
E03000
heap
page read and write
4676000
heap
page read and write
1664000
heap
page read and write
1664000
heap
page read and write
D8AE000
heap
page read and write
1653000
heap
page read and write
163C000
heap
page read and write
A63000
heap
page read and write
AD0000
heap
page read and write
DF0000
heap
page read and write
4D0E000
stack
page read and write
6CF32000
unkown
page read and write
4761000
heap
page read and write
AC0000
heap
page read and write
18888000
direct allocation
page read and write
DF0000
heap
page read and write
DBB000
heap
page read and write
1626000
heap
page read and write
4696000
heap
page read and write
A87000
heap
page read and write
D9D000
heap
page read and write
1601000
heap
page read and write
73A99000
unkown
page read and write
1875000
heap
page read and write
1899000
heap
page read and write
A23000
heap
page read and write
3469000
heap
page read and write
E0C000
heap
page read and write
A23000
heap
page read and write
18B4000
heap
page read and write
AD0000
heap
page read and write
AC0000
heap
page read and write
E03000
heap
page read and write
1741000
heap
page read and write
D43000
heap
page read and write
15E6000
heap
page read and write
A87000
heap
page read and write
D37000
heap
page read and write
1020000
heap
page read and write
DBB000
heap
page read and write
D43000
heap
page read and write
C73000
heap
page read and write
DD5000
heap
page read and write
1389000
heap
page read and write
47000
unkown
page read and write
CC2000
heap
page read and write
E0C000
heap
page read and write
1799D000
heap
page read and write
E4C000
heap
page read and write
C83000
heap
page read and write
D43000
heap
page read and write
AC0000
heap
page read and write
192C000
heap
page read and write
E03000
heap
page read and write
21000
unkown
page execute read
D7F000
heap
page read and write
3B000
unkown
page readonly
1633000
heap
page read and write
DBB000
heap
page read and write
1840000
heap
page read and write
19AD000
heap
page read and write
C9B000
heap
page read and write
4683000
heap
page read and write
25BDD000
heap
page read and write
A3F000
heap
page read and write
1990000
heap
page read and write
C72000
heap
page read and write
185B000
heap
page read and write
DD4000
heap
page read and write
DCC000
heap
page read and write
12C0000
heap
page read and write
1640000
heap
page read and write
AC0000
heap
page read and write
CD5000
heap
page read and write
DB3000
heap
page read and write
134A000
heap
page read and write
162A000
heap
page read and write
E0A000
heap
page read and write
182E000
heap
page read and write
1888000
heap
page read and write
CD5000
heap
page read and write
E5D000
heap
page read and write
E5D000
heap
page read and write
448000
unkown
page read and write
A83000
heap
page read and write
6E381000
unkown
page execute read
1601000
heap
page read and write
DF6000
heap
page read and write
21000
unkown
page execute read
15B4000
heap
page read and write
48000
unkown
page readonly
E32000
heap
page read and write
CC2000
heap
page read and write
D4A000
heap
page read and write
DD8000
heap
page read and write
D8E000
heap
page read and write
AC0000
heap
page read and write
18A8000
heap
page read and write
23FE000
heap
page read and write
21000
unkown
page execute read
1740000
heap
page read and write
185B000
heap
page read and write
D63000
heap
page read and write
A87000
heap
page read and write
C93000
heap
page read and write
3B4B000
heap
page read and write
D53000
heap
page read and write
702B000
direct allocation
page read and write
DAB000
heap
page read and write
4739000
heap
page read and write
D24000
heap
page read and write
1622000
heap
page read and write
15EA000
heap
page read and write
D3A000
heap
page read and write
173A000
heap
page read and write
E03000
heap
page read and write
A83000
heap
page read and write
6E38D000
unkown
page readonly
DC4000
heap
page read and write
173A000
heap
page read and write
C82000
heap
page read and write
1647000
heap
page read and write
15AF000
heap
page read and write
C82000
heap
page read and write
9E0000
heap
page read and write
E06000
heap
page read and write
3BD4000
heap
page read and write
DF6000
heap
page read and write
E00000
heap
page read and write
48E000
stack
page read and write
DF1000
heap
page read and write
165C000
heap
page read and write
DCC000
heap
page read and write
CDD000
heap
page read and write
D48000
heap
page read and write
4412000
heap
page read and write
182E000
heap
page read and write
3A3D000
heap
page read and write
195F000
heap
page read and write
C93000
heap
page read and write
152A000
heap
page read and write
1626000
heap
page read and write
C9B000
heap
page read and write
25AF1000
heap
page read and write
C9B000
heap
page read and write
12C0000
heap
page read and write
6CEF0000
unkown
page readonly
E0A000
heap
page read and write
D84000
heap
page read and write
11FF000
stack
page read and write
DD5000
heap
page read and write
61E000
heap
page read and write
164F000
heap
page read and write
D60000
heap
page read and write
25C4D000
heap
page read and write
45000
unkown
page write copy
C93000
heap
page read and write
1980000
heap
page read and write
48000
unkown
page readonly
1BB6000
heap
page read and write
1840000
heap
page read and write
1600000
heap
page read and write
E45000
heap
page read and write
1920000
heap
page read and write
1640000
heap
page read and write
1647000
heap
page read and write
DF6000
heap
page read and write
E06000
heap
page read and write
164F000
heap
page read and write
CC2000
heap
page read and write
AD0000
heap
page read and write
138C000
heap
page read and write
3837000
heap
page read and write
E01000
heap
page read and write
AED000
heap
page read and write
C838000
direct allocation
page read and write
1BC6000
heap
page read and write
A1B000
heap
page read and write
A8F000
heap
page read and write
3BA3000
heap
page read and write
A23000
heap
page read and write
1647000
heap
page read and write
A3F000
heap
page read and write
171A000
heap
page read and write
DFD000
heap
page read and write
E1E000
heap
page read and write
D34000
heap
page read and write
DF0000
heap
page read and write
1850000
heap
page read and write
DC8000
heap
page read and write
D43000
heap
page read and write
AD0000
heap
page read and write
1652000
heap
page read and write
164F000
heap
page read and write
A3F000
heap
page read and write
E16000
heap
page read and write
DB3000
heap
page read and write
771000
heap
page read and write
C9B000
heap
page read and write
D03000
heap
page read and write
D43000
heap
page read and write
C5C3000
direct allocation
page read and write
6CFA6000
unkown
page write copy
5E8000
heap
page read and write
C65000
heap
page read and write
14FF000
stack
page read and write
1980000
heap
page read and write
AD0000
heap
page read and write
D50000
heap
page read and write
48000
unkown
page readonly
C83000
heap
page read and write
D34000
heap
page read and write
75F000
heap
page read and write
401000
unkown
page execute read
18B4000
heap
page read and write
AC0000
heap
page read and write
175C000
heap
page read and write
A5B000
heap
page read and write
E60000
heap
page read and write
A79000
heap
page read and write
185B000
heap
page read and write
165C000
heap
page read and write
1623000
heap
page read and write
771000
heap
page read and write
164F000
heap
page read and write
C8B000
heap
page read and write
E02000
heap
page read and write
1746000
heap
page read and write
C93000
heap
page read and write
E6A000
heap
page read and write
16FB000
heap
page read and write
D45000
heap
page read and write
C83000
heap
page read and write
DF6000
heap
page read and write
A87000
heap
page read and write
766000
heap
page read and write
E0A000
heap
page read and write
3B000
unkown
page readonly
A73000
heap
page read and write
9F4000
heap
page read and write
D9C000
heap
page read and write
AD0000
heap
page read and write
1620000
heap
page read and write
E03000
heap
page read and write
3561000
heap
page read and write
75F000
heap
page read and write
1610000
heap
page read and write
9C000
stack
page read and write
E03000
heap
page read and write
CD1000
heap
page read and write
DFD000
heap
page read and write
E0C000
heap
page read and write
CD5000
heap
page read and write
E37000
heap
page read and write
DD2000
heap
page read and write
A5B000
heap
page read and write
E01000
heap
page read and write
C9B000
heap
page read and write
C51000
heap
page read and write
DC5000
heap
page read and write
164F000
heap
page read and write
1647000
heap
page read and write
E4C000
heap
page read and write
6E0F0000
unkown
page readonly
359E000
heap
page read and write
D53000
heap
page read and write
48000
unkown
page readonly
164F000
heap
page read and write
1BFF000
heap
page read and write
BDA000
heap
page read and write
A8F000
heap
page read and write
C93000
heap
page read and write
C7A000
heap
page read and write
72CE000
direct allocation
page read and write
164B000
heap
page read and write
A90000
heap
page read and write
C72000
heap
page read and write
150E000
heap
page read and write
1990000
heap
page read and write
AD0000
heap
page read and write
1BB6000
heap
page read and write
D7EF000
heap
page read and write
C9B000
heap
page read and write
1888000
heap
page read and write
6FD000
stack
page read and write
16FD000
heap
page read and write
3360000
heap
page read and write
1898000
heap
page read and write
195F000
heap
page read and write
E22000
heap
page read and write
A3F000
heap
page read and write
DAB000
heap
page read and write
1238000
heap
page read and write
3B94000
heap
page read and write
D3A000
heap
page read and write
DC1000
heap
page read and write
1634000
heap
page read and write
DC4000
heap
page read and write
1664000
heap
page read and write
40FE000
heap
page read and write
DCB000
heap
page read and write
2FEA000
heap
page read and write
A23000
heap
page read and write
1070000
heap
page read and write
173A000
heap
page read and write
1653000
heap
page read and write
1875000
heap
page read and write
D24000
heap
page read and write
3B94000
heap
page read and write
1640000
heap
page read and write
E03000
heap
page read and write
E37000
heap
page read and write
C72000
heap
page read and write
196A000
heap
page read and write
1695000
heap
page read and write
771000
heap
page read and write
DE4000
heap
page read and write
19AD000
heap
page read and write
DE8000
heap
page read and write
DE8000
heap
page read and write
DD7000
heap
page read and write
E16000
heap
page read and write
40F000
unkown
page readonly
D43000
heap
page read and write
DCC000
heap
page read and write
6E392000
unkown
page read and write
D24000
heap
page read and write
1BC6000
heap
page read and write
D65000
heap
page read and write
DC4000
heap
page read and write
71B3000
direct allocation
page read and write
E0C000
heap
page read and write
1BB4000
heap
page read and write
DE4000
heap
page read and write
E0C000
heap
page read and write
1898000
heap
page read and write
37BF000
heap
page read and write
1A6E000
heap
page read and write
1741000
heap
page read and write
E03000
heap
page read and write
16FD000
heap
page read and write
E5E000
heap
page read and write
E5D000
heap
page read and write
E03000
heap
page read and write
C82000
heap
page read and write
3B000
unkown
page readonly
1850000
heap
page read and write
22DE000
stack
page read and write
C93000
heap
page read and write
DF6000
heap
page read and write
1888000
heap
page read and write
E03000
heap
page read and write
1746000
heap
page read and write
DF6000
heap
page read and write
A76000
heap
page read and write
D33000
heap
page read and write
A83000
heap
page read and write
DE8000
heap
page read and write
4CCF000
unkown
page read and write
D00000
heap
page read and write
C05000
heap
page read and write
160B000
heap
page read and write
DF6000
heap
page read and write
D24000
heap
page read and write
D65000
heap
page read and write
10D0000
heap
page read and write
1BFF000
heap
page read and write
1BB6000
heap
page read and write
C7A000
heap
page read and write
47000
unkown
page write copy
CDD000
heap
page read and write
C26000
heap
page read and write
DC8000
heap
page read and write
C7A000
heap
page read and write
46A8000
heap
page read and write
173B000
heap
page read and write
75F000
heap
page read and write
1840000
heap
page read and write
163B000
heap
page read and write
4530000
heap
page read and write
7D6000
heap
page read and write
4C91000
heap
page read and write
D60000
heap
page read and write
A79000
heap
page read and write
395E000
heap
page read and write
1BCA000
heap
page read and write
1640000
heap
page read and write
C82000
heap
page read and write
1BCA000
heap
page read and write
D03000
heap
page read and write
11F0000
heap
page read and write
6CF49000
unkown
page write copy
E0C000
heap
page read and write
A0F000
heap
page read and write
6E473000
unkown
page readonly
CCC000
heap
page read and write
1888000
heap
page read and write
D60000
heap
page read and write
C82000
heap
page read and write
1647000
heap
page read and write
1653000
heap
page read and write
DC3000
heap
page read and write
1733000
heap
page read and write
7384000
direct allocation
page read and write
1BDA000
heap
page read and write
C73000
heap
page read and write
25C3C000
heap
page read and write
C82000
heap
page read and write
E22000
heap
page read and write
2A0A5000
heap
page read and write
E5D000
heap
page read and write
AC0000
heap
page read and write
A87000
heap
page read and write
E45000
heap
page read and write
DF6000
heap
page read and write
C9B000
heap
page read and write
A8F000
heap
page read and write
CDD000
heap
page read and write
DB3000
heap
page read and write
1BFF000
heap
page read and write
A73000
heap
page read and write
1653000
heap
page read and write
AD0000
heap
page read and write
173A000
heap
page read and write
1741000
heap
page read and write
1640000
heap
page read and write
E45000
heap
page read and write
1600000
heap
page read and write
CC2000
heap
page read and write
401000
unkown
page execute read
A83000
heap
page read and write
1610000
heap
page read and write
C93000
heap
page read and write
18A8000
heap
page read and write
C8E000
heap
page read and write
1898000
heap
page read and write
E16000
heap
page read and write
1658000
heap
page read and write
4598000
trusted library allocation
page read and write
8FD000
stack
page read and write
DAB000
heap
page read and write
5F1000
heap
page read and write
1653000
heap
page read and write
1BDA000
heap
page read and write
1647000
heap
page read and write
E45000
heap
page read and write
1658000
heap
page read and write
E0C000
heap
page read and write
E37000
heap
page read and write
1611000
heap
page read and write
1600000
heap
page read and write
DBB000
heap
page read and write
E0C000
heap
page read and write
182E000
heap
page read and write
1352000
heap
page read and write
A0B000
heap
page read and write
1840000
heap
page read and write
DBB000
heap
page read and write
1658000
heap
page read and write
1657000
heap
page read and write
195F000
heap
page read and write
E01000
heap
page read and write
3C32000
heap
page read and write
177F000
heap
page read and write
1BC6000
heap
page read and write
457F000
trusted library allocation
page read and write
18B4000
heap
page read and write
E0B000
heap
page read and write
A76000
heap
page read and write
E03000
heap
page read and write
1647000
heap
page read and write
766000
heap
page read and write
1736000
heap
page read and write
3B8F000
heap
page read and write
2397000
heap
page read and write
C9B000
heap
page read and write
E30000
heap
page read and write
1175000
heap
page read and write
E1E000
heap
page read and write
1899000
heap
page read and write
D4F000
heap
page read and write
DBB000
heap
page read and write
1634000
heap
page read and write
A23000
heap
page read and write
9AC000
heap
page read and write
E0A000
heap
page read and write
F8D000
heap
page read and write
E4C000
heap
page read and write
48D7000
heap
page read and write
1DAC000
heap
page read and write
CD5000
heap
page read and write
A31000
heap
page read and write
36BE000
heap
page read and write
A83000
heap
page read and write
18AD000
heap
page read and write
DCC000
heap
page read and write
E6E000
heap
page read and write
3BE1000
heap
page read and write
195F000
heap
page read and write
E0C000
heap
page read and write
E0C000
heap
page read and write
D53000
heap
page read and write
D4F000
heap
page read and write
E2C2000
heap
page read and write
1875000
heap
page read and write
D43000
heap
page read and write
1647000
heap
page read and write
6FD000
stack
page read and write
D8E000
heap
page read and write
189F000
heap
page read and write
E03000
heap
page read and write
AAE000
heap
page read and write
1653000
heap
page read and write
1653000
heap
page read and write
C4A000
heap
page read and write
E0C000
heap
page read and write
1736000
heap
page read and write
195F000
heap
page read and write
1647000
heap
page read and write
19D4000
heap
page read and write
185B000
heap
page read and write
3C56000
heap
page read and write
DD4000
heap
page read and write
D5F000
heap
page read and write
AC0000
heap
page read and write
165A000
heap
page read and write
CD5000
heap
page read and write
1BDE000
heap
page read and write
3B8F000
heap
page read and write
1898000
heap
page read and write
DCF000
heap
page read and write
1647000
heap
page read and write
1658000
heap
page read and write
393F000
heap
page read and write
CBE000
heap
page read and write
196E000
heap
page read and write
E4C000
heap
page read and write
1B65000
heap
page read and write
CD1000
heap
page read and write
A78000
heap
page read and write
5CE000
stack
page read and write
141A000
heap
page read and write
6C833000
unkown
page readonly
1634000
heap
page read and write
E07000
heap
page read and write
E01000
heap
page read and write
A73000
heap
page read and write
D63000
heap
page read and write
DC4000
heap
page read and write
AC0000
heap
page read and write
A73000
heap
page read and write
1C1E000
heap
page read and write
15EE000
heap
page read and write
A8F000
heap
page read and write
C9B000
heap
page read and write
19AD000
heap
page read and write
D34000
heap
page read and write
1888000
heap
page read and write
1621000
heap
page read and write
196D000
heap
page read and write
A74000
heap
page read and write
1664000
heap
page read and write
1BB6000
heap
page read and write
1741000
heap
page read and write
3A1E000
heap
page read and write
47000
unkown
page read and write
70D5000
direct allocation
page read and write
189C000
heap
page read and write
771000
heap
page read and write
1634000
heap
page read and write
E37000
heap
page read and write
DE4000
heap
page read and write
46E5000
heap
page read and write
D4F000
heap
page read and write
9D5000
heap
page read and write
1B57000
heap
page read and write
45000
unkown
page read and write
C83000
heap
page read and write
182E000
heap
page read and write
740000
heap
page read and write
C8A000
heap
page read and write
C82000
heap
page read and write
6CF65000
unkown
page read and write
35E7000
heap
page read and write
1630000
heap
page read and write
3BDC000
heap
page read and write
DD4000
heap
page read and write
C7A000
heap
page read and write
1008000
heap
page read and write
1664000
heap
page read and write
9E1000
heap
page read and write
164F000
heap
page read and write
D43000
heap
page read and write
179AF000
heap
page read and write
D6A000
heap
page read and write
164F000
heap
page read and write
25AF1000
heap
page read and write
45A8000
trusted library allocation
page read and write
456F000
trusted library allocation
page read and write
1653000
heap
page read and write
326C000
heap
page read and write
40C1000
heap
page read and write
1826000
heap
page read and write
E26000
heap
page read and write
D98000
heap
page read and write
D34000
heap
page read and write
DA7000
heap
page read and write
DF6000
heap
page read and write
1875000
heap
page read and write
6CF48000
unkown
page read and write
A1B000
heap
page read and write
9DD000
heap
page read and write
E02000
heap
page read and write
D60000
heap
page read and write
1640000
heap
page read and write
43BE000
stack
page read and write
180D000
heap
page read and write
D88E000
heap
page read and write
AED000
heap
page read and write
CD5000
heap
page read and write
1728000
heap
page read and write
1BB6000
heap
page read and write
D31000
heap
page read and write
C7A000
heap
page read and write
E07000
heap
page read and write
1BDA000
heap
page read and write
F6D000
heap
page read and write
E03000
heap
page read and write
E5D000
heap
page read and write
1653000
heap
page read and write
AC0000
heap
page read and write
171A000
heap
page read and write
25D77000
heap
page read and write
DFD000
heap
page read and write
D63000
heap
page read and write
1647000
heap
page read and write
DD5000
heap
page read and write
E5D000
heap
page read and write
17E4000
heap
page read and write
165C000
heap
page read and write
C72000
heap
page read and write
E10000
heap
page read and write
E1A000
heap
page read and write
E5D000
heap
page read and write
E45000
heap
page read and write
A31000
heap
page read and write
AD0000
heap
page read and write
DBB000
heap
page read and write
F8D000
heap
page read and write
AAA000
heap
page read and write
DB5000
heap
page read and write
73F8000
direct allocation
page read and write
E01000
heap
page read and write
E17000
heap
page read and write
D3A000
heap
page read and write
D65000
heap
page read and write
13FB000
heap
page read and write
DC4000
heap
page read and write
21000
unkown
page execute read
D34000
heap
page read and write
164F000
heap
page read and write
C9B000
heap
page read and write
DDC000
heap
page read and write
CD68000
heap
page read and write
6CFA6000
unkown
page write copy
1610000
heap
page read and write
6CFA9000
unkown
page readonly
D63000
heap
page read and write
A3F000
heap
page read and write
2FC4000
unkown
page readonly
3468000
heap
page read and write
E4E000
heap
page read and write
164F000
heap
page read and write
E4C000
heap
page read and write
25C9D000
heap
page read and write
A8F000
heap
page read and write
19C000
unkown
page read and write
185B000
heap
page read and write
17504000
heap
page read and write
79E000
stack
page read and write
1647000
heap
page read and write
A63000
heap
page read and write
6CFA9000
unkown
page readonly
E03000
heap
page read and write
1823000
heap
page read and write
AD0000
heap
page read and write
1625000
heap
page read and write
75F000
heap
page read and write
A31000
heap
page read and write
E6C000
heap
page read and write
4EEA000
direct allocation
page execute and read and write
A74000
heap
page read and write
E30000
heap
page read and write
D5F000
heap
page read and write
21000
unkown
page execute read
1664000
heap
page read and write
D84000
heap
page read and write
E03000
heap
page read and write
D48000
heap
page read and write
C552000
direct allocation
page read and write
2328000
heap
page read and write
771000
heap
page read and write
A23000
heap
page read and write
18AD000
heap
page read and write
1610000
heap
page read and write
2A07B000
heap
page read and write
1BE6000
heap
page read and write
E02000
heap
page read and write
DFD000
heap
page read and write
A83000
heap
page read and write
E03000
heap
page read and write
1306000
heap
page read and write
182E000
heap
page read and write
F6E000
heap
page read and write
C73000
heap
page read and write
102D000
heap
page read and write
20000
unkown
page readonly
1741000
heap
page read and write
1647000
heap
page read and write
1647000
heap
page read and write
DD5000
heap
page read and write
173A000
heap
page read and write
E295000
heap
page read and write
D88000
heap
page read and write
AD0000
heap
page read and write
1647000
heap
page read and write
E49000
heap
page read and write
E03000
heap
page read and write
177BE000
stack
page read and write
C89000
heap
page read and write
E45000
heap
page read and write
18A8000
heap
page read and write
DFD000
heap
page read and write
1763E000
stack
page read and write
4579000
trusted library allocation
page read and write
DE8000
heap
page read and write
D24000
heap
page read and write
E02000
heap
page read and write
4D9F000
trusted library allocation
page read and write
E0C000
heap
page read and write
E0C000
heap
page read and write
1621000
heap
page read and write
1500000
heap
page read and write
A79000
heap
page read and write
A78000
heap
page read and write
1838000
heap
page read and write
1610000
heap
page read and write
173A000
heap
page read and write
E0A000
heap
page read and write
1BCA000
heap
page read and write
D85000
heap
page read and write
AC0000
heap
page read and write
731B000
direct allocation
page read and write
E45000
heap
page read and write
1990000
heap
page read and write
D24000
heap
page read and write
AD0000
heap
page read and write
19AD000
heap
page read and write
4F3C000
direct allocation
page execute and read and write
AC0000
heap
page read and write
DC1000
heap
page read and write
C77C000
direct allocation
page read and write
2380000
heap
page read and write
C73000
heap
page read and write
173A000
heap
page read and write
1690000
heap
page read and write
25CB9000
heap
page read and write
9E8000
heap
page read and write
3BBC000
heap
page read and write
D24000
heap
page read and write
766000
heap
page read and write
C7A000
heap
page read and write
19AD000
heap
page read and write
C84000
heap
page read and write
D43000
heap
page read and write
1616000
heap
page read and write
1990000
heap
page read and write
DC5000
heap
page read and write
34EA000
heap
page read and write
D84000
heap
page read and write
E0C000
heap
page read and write
15B0000
heap
page read and write
AC0000
heap
page read and write
DB5000
heap
page read and write
D01000
heap
page read and write
DC4000
heap
page read and write
163B000
heap
page read and write
1898000
heap
page read and write
D43000
heap
page read and write
1621000
heap
page read and write
DCC000
heap
page read and write
4589000
trusted library allocation
page read and write
DC4000
heap
page read and write
1720000
heap
page read and write
A5B000
heap
page read and write
DBD000
heap
page read and write
4683000
heap
page read and write
9FF000
heap
page read and write
A79000
heap
page read and write
241B000
heap
page read and write
E03000
heap
page read and write
E30000
heap
page read and write
160B000
heap
page read and write
1BFF000
heap
page read and write
A31000
heap
page read and write
4579000
trusted library allocation
page read and write
19A4000
heap
page read and write
A1B000
heap
page read and write
AD0000
heap
page read and write
4676000
heap
page read and write
3B70000
heap
page read and write
D34000
heap
page read and write
E10000
heap
page read and write
DF0000
heap
page read and write
DA5000
heap
page read and write
D36000
heap
page read and write
174F000
heap
page read and write
164F000
heap
page read and write
E03000
heap
page read and write
2CBF000
heap
page read and write
C82000
heap
page read and write
DC5000
heap
page read and write
C9B000
heap
page read and write
C826000
direct allocation
page read and write
E03000
heap
page read and write
1D6000
heap
page read and write
E17000
heap
page read and write
E07000
heap
page read and write
DC1000
heap
page read and write
D97000
heap
page read and write
E37000
heap
page read and write
DE4000
heap
page read and write
AD0000
heap
page read and write
45000
unkown
page read and write
DFD000
heap
page read and write
A1B000
heap
page read and write
DFD000
heap
page read and write
DD4000
heap
page read and write
AD0000
heap
page read and write
AD0000
heap
page read and write
3564000
heap
page read and write
AD0000
heap
page read and write
19AD000
heap
page read and write
A87000
heap
page read and write
D65000
heap
page read and write
A3F000
heap
page read and write
164F000
heap
page read and write
E03000
heap
page read and write
19AD000
heap
page read and write
1633000
heap
page read and write
3ED000
stack
page read and write
238B000
heap
page read and write
151C000
heap
page read and write
AED000
heap
page read and write
3940000
heap
page read and write
C7A000
heap
page read and write
6CEF1000
unkown
page execute read
E06000
heap
page read and write
D33000
heap
page read and write
D60000
heap
page read and write
1840000
heap
page read and write
21000
unkown
page execute read
3C79000
heap
page read and write
1664000
heap
page read and write
DC4000
heap
page read and write
75F000
heap
page read and write
DF6000
heap
page read and write
1BE6000
heap
page read and write
164F000
heap
page read and write
E03000
heap
page read and write
DE4000
heap
page read and write
A3F000
heap
page read and write
AD0000
heap
page read and write
E03000
heap
page read and write
D24000
heap
page read and write
A7E000
heap
page read and write
DF8000
heap
page read and write
1AAA000
heap
page read and write
A78000
heap
page read and write
DFD000
heap
page read and write
25CC1000
heap
page read and write
E37000
heap
page read and write
17A2000
heap
page read and write
AC1000
heap
page read and write
158B000
heap
page read and write
6CFA6000
unkown
page write copy
164F000
heap
page read and write
CDD000
heap
page read and write
DCC000
heap
page read and write
AC0000
heap
page read and write
1640000
heap
page read and write
4569000
trusted library allocation
page read and write
1BE6000
heap
page read and write
1664000
heap
page read and write
175C000
heap
page read and write
A23000
heap
page read and write
A5B000
heap
page read and write
60A000
heap
page read and write
D24000
heap
page read and write
189E000
heap
page read and write
15EC000
heap
page read and write
DC1000
heap
page read and write
A3F000
heap
page read and write
1647000
heap
page read and write
A63000
heap
page read and write
C82000
heap
page read and write
D65000
heap
page read and write
1875000
heap
page read and write
1980000
heap
page read and write
D34000
heap
page read and write
DC1000
heap
page read and write
AD0000
heap
page read and write
1640000
heap
page read and write
1824000
heap
page read and write
AD0000
heap
page read and write
75F000
heap
page read and write
E37000
heap
page read and write
C36000
heap
page read and write
1BDA000
heap
page read and write
E22000
heap
page read and write
75F000
heap
page read and write
3B000
unkown
page readonly
AED000
heap
page read and write
15AE000
heap
page read and write
DCC000
heap
page read and write
E59000
heap
page read and write
162F000
heap
page read and write
D24000
heap
page read and write
1653000
heap
page read and write
1647000
heap
page read and write
DF0000
heap
page read and write
DC5000
heap
page read and write
CD82000
heap
page read and write
C46000
heap
page read and write
156D000
heap
page read and write
185B000
heap
page read and write
1990000
heap
page read and write
48000
unkown
page readonly
E21000
heap
page read and write
163B000
heap
page read and write
C73000
heap
page read and write
E6A000
heap
page read and write
AC0000
heap
page read and write
C83000
heap
page read and write
16FD000
heap
page read and write
D60000
heap
page read and write
1664000
heap
page read and write
E2C2000
heap
page read and write
9F6000
heap
page read and write
97E000
stack
page read and write
D63000
heap
page read and write
AED000
heap
page read and write
C93000
heap
page read and write
D57000
heap
page read and write
A87000
heap
page read and write
DF6000
heap
page read and write
412000
unkown
page read and write
AC0000
heap
page read and write
D3C000
heap
page read and write
CD5000
heap
page read and write
16B3000
heap
page read and write
1634000
heap
page read and write
1888000
heap
page read and write
240B000
heap
page read and write
178C0000
heap
page read and write
25BFC000
heap
page read and write
D4A000
heap
page read and write
18B4000
heap
page read and write
1990000
heap
page read and write
E0C000
heap
page read and write
D4A000
heap
page read and write
3788000
trusted library allocation
page read and write
AD0000
heap
page read and write
182F000
heap
page read and write
25BEC000
heap
page read and write
1658000
heap
page read and write
D63000
heap
page read and write
3B7D000
heap
page read and write
C73000
heap
page read and write
1747000
heap
page read and write
1658000
heap
page read and write
4C8E000
heap
page read and write
E0A000
heap
page read and write
E5D000
heap
page read and write
25D7B000
heap
page read and write
1840000
heap
page read and write
E6C000
heap
page read and write
A78000
heap
page read and write
771000
heap
page read and write
A73000
heap
page read and write
6CFA9000
unkown
page readonly
DE8000
heap
page read and write
D48000
heap
page read and write
A73000
heap
page read and write
3BBC000
heap
page read and write
25C35000
heap
page read and write
E0C000
heap
page read and write
C83000
heap
page read and write
3ECD000
heap
page read and write
164F000
heap
page read and write
DFD000
heap
page read and write
D60000
heap
page read and write
21000
unkown
page execute read
D65000
heap
page read and write
733FB000
unkown
page readonly
E0A000
heap
page read and write
AC0000
heap
page read and write
173A000
heap
page read and write
DF6000
heap
page read and write
DF6000
heap
page read and write
1BD5000
heap
page read and write
48000
unkown
page readonly
172B000
heap
page read and write
D60000
heap
page read and write
A23000
heap
page read and write
1653000
heap
page read and write
DF6000
heap
page read and write
15AB000
heap
page read and write
AC0000
heap
page read and write
A63000
heap
page read and write
3CFC000
heap
page read and write
C3F000
heap
page read and write
400000
unkown
page readonly
21000
unkown
page execute read
A83000
heap
page read and write
12FD000
heap
page read and write
766000
heap
page read and write
1664000
heap
page read and write
E32000
heap
page read and write
A76000
heap
page read and write
AD0000
heap
page read and write
DB2000
heap
page read and write
A8F000
heap
page read and write
19AD000
heap
page read and write
E00000
heap
page read and write
16C9000
heap
page read and write
1664000
heap
page read and write
6CFA6000
unkown
page write copy
D65000
heap
page read and write
196A000
heap
page read and write
7CF000
heap
page read and write
C82000
heap
page read and write
448000
unkown
page write copy
164F000
heap
page read and write
179A5000
heap
page read and write
E30000
heap
page read and write
25CD5000
heap
page read and write
3BA0000
heap
page read and write
156E000
heap
page read and write
A63000
heap
page read and write
1888000
heap
page read and write
BFD000
heap
page read and write
771000
heap
page read and write
1840000
heap
page read and write
A1B000
heap
page read and write
766000
heap
page read and write
3B60000
heap
page read and write
3C36000
heap
page read and write
DFD000
heap
page read and write
25C6C000
heap
page read and write
1875000
heap
page read and write
D9A000
heap
page read and write
412000
unkown
page write copy
C83000
heap
page read and write
182E000
heap
page read and write
161F000
heap
page read and write
6E0F1000
unkown
page execute read
DF4000
heap
page read and write
E02000
heap
page read and write
38B3000
heap
page read and write
DAD000
heap
page read and write
170C000
heap
page read and write
D4A000
heap
page read and write
E1B000
heap
page read and write
C63A000
direct allocation
page read and write
1621000
heap
page read and write
A83000
heap
page read and write
D63000
heap
page read and write
A63000
heap
page read and write
E5D000
heap
page read and write
DC7000
heap
page read and write
E06000
heap
page read and write
1651000
heap
page read and write
163C000
heap
page read and write
E0C000
heap
page read and write
E03000
heap
page read and write
D4F000
heap
page read and write
DE5000
heap
page read and write
1664000
heap
page read and write
C72000
heap
page read and write
D41000
heap
page read and write
E45000
heap
page read and write
1000000
heap
page read and write
173B000
heap
page read and write
1850000
heap
page read and write
1BDA000
heap
page read and write
198B000
heap
page read and write
DD5000
heap
page read and write
160F000
heap
page read and write
355D000
heap
page read and write
DF2000
heap
page read and write
16F1000
heap
page read and write
DCF000
heap
page read and write
DFD000
heap
page read and write
D3A000
heap
page read and write
D3C000
heap
page read and write
3511000
heap
page read and write
D5F000
heap
page read and write
AC0000
heap
page read and write
D24000
heap
page read and write
161F000
heap
page read and write
D84000
heap
page read and write
33E0000
heap
page read and write
A8F000
heap
page read and write
1850000
heap
page read and write
D34000
heap
page read and write
1849000
heap
page read and write
E45000
heap
page read and write
D7B000
heap
page read and write
A73000
heap
page read and write
17E6000
heap
page read and write
46F5000
heap
page read and write
D24000
heap
page read and write
E37000
heap
page read and write
372F000
heap
page read and write
456F000
trusted library allocation
page read and write
E03000
heap
page read and write
E5D000
heap
page read and write
C83000
heap
page read and write
CBD000
stack
page read and write
1655000
heap
page read and write
D33000
heap
page read and write
4570000
heap
page read and write
A26000
heap
page read and write
100B000
heap
page read and write
A3F000
heap
page read and write
40F000
unkown
page readonly
D53000
heap
page read and write
170B000
heap
page read and write
766000
heap
page read and write
D9A000
heap
page read and write
172FE000
unkown
page read and write
6CF44000
unkown
page read and write
1850000
heap
page read and write
E0C000
heap
page read and write
E0C000
heap
page read and write
AD0000
heap
page read and write
1658000
heap
page read and write
172B000
heap
page read and write
D03000
heap
page read and write
170B000
heap
page read and write
C7A000
heap
page read and write
A87000
heap
page read and write
E03000
heap
page read and write
E16000
heap
page read and write
19AD000
heap
page read and write
A79000
heap
page read and write
1540000
heap
page read and write
1355000
heap
page read and write
1AF1000
heap
page read and write
172A000
heap
page read and write
18A8000
heap
page read and write
45000
unkown
page write copy
D63000
heap
page read and write
1008000
heap
page read and write
D9B000
heap
page read and write
C6E000
heap
page read and write
A23000
heap
page read and write
A5B000
heap
page read and write
A3F000
heap
page read and write
766000
heap
page read and write
1613000
heap
page read and write
DD4000
heap
page read and write
D7F000
heap
page read and write
766000
heap
page read and write
766000
heap
page read and write
D43000
heap
page read and write
E45000
heap
page read and write
A76000
heap
page read and write
189E000
heap
page read and write
C7A000
heap
page read and write
174F000
heap
page read and write
A3F000
heap
page read and write
D90000
heap
page read and write
162B000
heap
page read and write
18AA9000
unkown
page read and write
CDD000
heap
page read and write
D03000
heap
page read and write
3BCC000
heap
page read and write
1610000
heap
page read and write
E4C000
heap
page read and write
1653000
heap
page read and write
195F000
heap
page read and write
A79000
heap
page read and write
1630000
heap
page read and write
1607000
heap
page read and write
DB5000
heap
page read and write
DE8000
heap
page read and write
D03000
heap
page read and write
A23000
heap
page read and write
A23000
heap
page read and write
6CFA9000
unkown
page readonly
DFD000
heap
page read and write
173A000
heap
page read and write
196C000
heap
page read and write
ED3000
heap
page read and write
A5B000
heap
page read and write
18E1000
heap
page read and write
164F000
heap
page read and write
173A000
heap
page read and write
C63E000
direct allocation
page read and write
DCC000
heap
page read and write
C82000
heap
page read and write
75F000
heap
page read and write
3C56000
heap
page read and write
1653000
heap
page read and write
CC6000
heap
page read and write
D8A000
heap
page read and write
1750000
heap
page read and write
4683000
heap
page read and write
19AD000
heap
page read and write
F00000
heap
page read and write
1990000
heap
page read and write
DC6000
heap
page read and write
E06000
heap
page read and write
D63000
heap
page read and write
1BC6000
heap
page read and write
4530000
heap
page read and write
1610000
heap
page read and write
CD5000
heap
page read and write
1653000
heap
page read and write
A8F000
heap
page read and write
C69000
heap
page read and write
DD4000
heap
page read and write
7010000
direct allocation
page read and write
D3A000
heap
page read and write
1620000
heap
page read and write
1751000
heap
page read and write
D24000
heap
page read and write
AD0000
heap
page read and write
DB5000
heap
page read and write
E03000
heap
page read and write
3C26000
heap
page read and write
DFD000
heap
page read and write
C7A000
heap
page read and write
163C000
heap
page read and write
C81D000
direct allocation
page read and write
CC2000
heap
page read and write
DCC000
heap
page read and write
C9B000
heap
page read and write
1653000
heap
page read and write
160F000
heap
page read and write
16CD000
heap
page read and write
1658000
heap
page read and write
1980000
heap
page read and write
164F000
heap
page read and write
173A000
heap
page read and write
1653000
heap
page read and write
DA7000
heap
page read and write
A8F000
heap
page read and write
AC0000
heap
page read and write
179A7000
heap
page read and write
A76000
heap
page read and write
1647000
heap
page read and write
D04000
heap
page read and write
1647000
heap
page read and write
CD1000
heap
page read and write
D33000
heap
page read and write
1647000
heap
page read and write
E49000
heap
page read and write
E5D000
heap
page read and write
A23000
heap
page read and write
1875000
heap
page read and write
DFD000
heap
page read and write
1840000
heap
page read and write
147E000
heap
page read and write
19EC000
heap
page read and write
170B000
heap
page read and write
D63000
heap
page read and write
E5D000
heap
page read and write
C4E000
heap
page read and write
A23000
heap
page read and write
ACE000
stack
page read and write
DE8000
heap
page read and write
DCC000
heap
page read and write
D43000
heap
page read and write
3BE6000
heap
page read and write
6CEF1000
unkown
page execute read
17DFF000
unkown
page read and write
118D000
stack
page read and write
E03000
heap
page read and write
15DB000
heap
page read and write
170B000
heap
page read and write
199D000
heap
page read and write
DF0000
heap
page read and write
25C9D000
heap
page read and write
E26000
heap
page read and write
E20000
heap
page read and write
185B000
heap
page read and write
B50000
heap
page read and write
E32000
heap
page read and write
A31000
heap
page read and write
1840000
heap
page read and write
766000
heap
page read and write
E37000
heap
page read and write
CCA000
heap
page read and write
E06000
heap
page read and write
D4A000
heap
page read and write
1650000
heap
page read and write
1958000
heap
page read and write
3BBC000
heap
page read and write
A63000
heap
page read and write
138E000
stack
page read and write
AD0000
heap
page read and write
173A000
heap
page read and write
25B6D000
heap
page read and write
C7A000
heap
page read and write
D53000
heap
page read and write
185B000
heap
page read and write
163C000
heap
page read and write
C93000
heap
page read and write
D4F000
heap
page read and write
18040000
direct allocation
page read and write
DD4000
heap
page read and write
163B000
heap
page read and write
D43000
heap
page read and write
1980000
heap
page read and write
1658000
heap
page read and write
457F000
trusted library allocation
page read and write
164F000
heap
page read and write
AED000
heap
page read and write
1BE6000
heap
page read and write
1340000
heap
page read and write
1570000
heap
page read and write
1BE6000
heap
page read and write
E0C000
heap
page read and write
7BF000
stack
page read and write
3885000
heap
page read and write
D53000
heap
page read and write
88E000
heap
page read and write
18AD000
heap
page read and write
1755000
heap
page read and write
D4F000
heap
page read and write
E37000
heap
page read and write
18CF0000
heap
page read and write
E0C000
heap
page read and write
173A000
heap
page read and write
DE4000
heap
page read and write
AD0000
heap
page read and write
172B000
heap
page read and write
EDA000
heap
page read and write
162F000
heap
page read and write
D34000
heap
page read and write
75F000
heap
page read and write
D63000
heap
page read and write
6E380000
unkown
page readonly
12BA000
heap
page read and write
1664000
heap
page read and write
165E000
heap
page read and write
48000
unkown
page readonly
635000
heap
page read and write
19AD000
heap
page read and write
45000
unkown
page write copy
164F000
heap
page read and write
2A173000
heap
page read and write
AC0000
heap
page read and write
CC6000
heap
page read and write
20000
unkown
page readonly
3B69000
heap
page read and write
25C3C000
heap
page read and write
E03000
heap
page read and write
1607000
heap
page read and write
DD4000
heap
page read and write
A4E000
stack
page read and write
1725000
heap
page read and write
6CFA9000
unkown
page readonly
1630000
heap
page read and write
E02000
heap
page read and write
D7F000
heap
page read and write
A78000
heap
page read and write
412D000
heap
page read and write
3BA2000
heap
page read and write
A63000
heap
page read and write
A0F000
heap
page read and write
DE0000
heap
page read and write
407E000
heap
page read and write
45B8000
trusted library allocation
page read and write
3BCE000
heap
page read and write
E03000
heap
page read and write
40F000
unkown
page readonly
1647000
heap
page read and write
3B99000
heap
page read and write
17C3000
heap
page read and write
1601000
heap
page read and write
3E4E000
heap
page read and write
DE4000
heap
page read and write
DB5000
heap
page read and write
D89000
heap
page read and write
DB3000
heap
page read and write
1008000
heap
page read and write
DCC000
heap
page read and write
A23000
heap
page read and write
1653000
heap
page read and write
2540000
heap
page read and write
E0C000
heap
page read and write
AC0000
heap
page read and write
1610000
heap
page read and write
1041000
heap
page read and write
45A8000
trusted library allocation
page read and write
3B58000
heap
page read and write
A87000
heap
page read and write
164F000
heap
page read and write
A78000
heap
page read and write
1640000
heap
page read and write
D33000
heap
page read and write
3F3D000
heap
page read and write
A78000
heap
page read and write
D24000
heap
page read and write
D3A000
heap
page read and write
1840000
heap
page read and write
D5F000
heap
page read and write
1630000
heap
page read and write
C82000
heap
page read and write
1980000
heap
page read and write
25BCD000
heap
page read and write
12FD000
stack
page read and write
25D3C000
heap
page read and write
A76000
heap
page read and write
25CC3000
heap
page read and write
E11000
heap
page read and write
1653000
heap
page read and write
3B000
unkown
page readonly
CB8000
heap
page read and write
C72000
heap
page read and write
DF6000
heap
page read and write
766000
heap
page read and write
1BE6000
heap
page read and write
47AA000
direct allocation
page read and write
1653000
heap
page read and write
E45000
heap
page read and write
E12000
heap
page read and write
A79000
heap
page read and write
E0C000
heap
page read and write
181C000
heap
page read and write
D01000
heap
page read and write
1633000
heap
page read and write
880000
heap
page read and write
DC1000
heap
page read and write
1653000
heap
page read and write
D9A000
heap
page read and write
1747000
heap
page read and write
CBC000
heap
page read and write
E0C000
heap
page read and write
A83000
heap
page read and write
1BDE000
heap
page read and write
1BBF000
heap
page read and write
E0C000
heap
page read and write
1647000
heap
page read and write
E1A000
heap
page read and write
19AD000
heap
page read and write
170B000
heap
page read and write
E06000
heap
page read and write
There are 6346 hidden memdumps, click here to show them.