IOC Report
SecuriteInfo.com.W64.Remsim.A.gen.Eldorado.3236.10370.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W64.Remsim.A.gen.Eldorado.3236.10370.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Remote Support.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\translations\en.txt
ASCII text
dropped
malicious
C:\ProgramData\SimpleHelp\ElevateSH\MMoveLauncher3601372218457082792.service
ASCII text, with very long lines (650), with CRLF line terminators
dropped
C:\ProgramData\SimpleHelp\ElevateSH\elev_win.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\JWrapper-Windows64JRE-version[1].txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\JWrapper-Windows64JRE-version[2].txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\JWrapper-Windows64JRE-00084000053-archive.p2[1].l2
LZMA compressed data, non-streamed, size 44474039
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\JWrapper-Windows64JRE-00084000053-archive.p2[2].l2
LZMA compressed data, non-streamed, size 44474039
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\JWrapper-Windows64JRE-version[1].txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\2536
data
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\6228
data
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\6632
data
dropped
C:\Users\user\AppData\Local\Temp\imageio1618105115546130209.tmp
PNG image data, 638 x 138, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio188376414760025768.tmp
PNG image data, 319 x 69, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio4030692156986925597.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio5536186975918175331.tmp
PNG image data, 4 x 18, 8-bit grayscale, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio5908421726932066106.tmp
PNG image data, 4 x 18, 8-bit grayscale, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio6748021344045692368.tmp
PNG image data, 10 x 18, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\imageio7875820536965895161.tmp
PNG image data, 4 x 18, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\DetectedProxies
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\ProxyCredentials
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\basicinfo
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\branding\helpUqxlUcaG80\applet_splash.png
PNG image data, 319 x 69, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\branding\helpUqxlUcaG80\applet_splash@2x.png
PNG image data, 638 x 138, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\branding\helpUqxlUcaG80\branding.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWAppsSharedConfig\translations\help.qxl.ca\en_alt.txt
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\ChosenLanguage
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\JRE-LastSuccessfulOptions-JWrapper-Windows64JRE-00084000053-complete
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\JreNameOverride
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\JreNameOverride.afos_complete (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\JreNameOverride.afos_interim
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWApps\Remote_SupportICO.ico
MS Windows icon resource - 5 icons, 16x16, 32 bits/pixel, 24x24, 32 bits/pixel
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWUpdateARInstruction (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWUpdateARInstruction.ar-inst-incomplete
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\JWrapper-Windows64JRE-version.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\unrestricted\JWLaunchProperties-2833118773-23
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\unrestricted\JWrapper-Remote Support-splash.png
PNG image data, 300 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-JWrapper-00102236230-complete\unrestricted\jwLastRun
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\SimpleService.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\cadasuser.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\shcad.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\simplehelper64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\unrestricted\JWLaunchProperties-1716525085517-3
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\unrestricted\jwLastRun
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\utils_wnative_dxgi_intel-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\utils_wnative_intel-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\utils_wnative_shpty_intel-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\utils_wnative_winpty_intel-64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\winpty-agent64.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Remote SupportECompatibility.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Session Elevation Helper
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\unrestricted\jwLastRun
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\JWrapper-JWrapper-version.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\JWrapper-Remote Support-ICNS.icns
Mac OS X icon, 118432 bytes, "is32" type
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\JWrapper-Remote Support-splash.png
PNG image data, 352 x 72, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\JWrapperLaunch
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\SimpleService.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\elev_mac
Mach-O universal binary with 3 architectures: [i386:\012- Mach-O i386 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_HEAP_EXECUTION>] [x86_64:Mach-O 64-bit x86_64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL>] [arm64:Mach-O 64-bit arm64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|PIE>]
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\elev_win.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\jwAuthorPublicKey
ASCII text, with very long lines (1033), with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\jwBuildVersion
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\jwrapperlib\jwstandalone.jar
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\jwrapperlib\jwstandalonelaunch.jar
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\jwutils_win32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\jwutils_win64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\libjwutils_linux32.so
ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, with debug_info, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\libjwutils_linux32arm.so
ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, BuildID[sha1]=0d3184baadd25544b9ede9ac16431accd8ba85b7, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\libjwutils_linux64.so
ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, with debug_info, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\libjwutils_linux64arm.so
ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=4b97def7328c5ced5eaff796c3e6ba3ff532c45b, not stripped
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\libjwutils_macos.jnilib
Mach-O universal binary with 3 architectures: [x86_64:Mach-O 64-bit x86_64 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK|NO_REEXPORTED_DYLIBS>] [i386:Mach-O i386 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK|NO_REEXPORTED_DYLIBS>] [arm64:Mach-O 64-bit arm64 dynamically linked shared library, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK|NO_REEXPORTED_DYLIBS>]
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\nativesplash.png
PNG image data, 300 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716524939-5-app\session_win.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\ASSEMBLY_EXCEPTION
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\CLASSPATH_EXCEPTION_NOTE
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\DISCLAIMER
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\THIRD_PARTY_README
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\Welcome.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\JAWTAccessBridge-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\JavaAccessBridge-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\WindowsAccessBridge-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\awt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\dt_shmem.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\dt_socket.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\fontmanager.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\freetype.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\hprof.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\instrument.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\j2pcsc.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\j2pkcs11.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\jaas_nt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\java-rmi.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\java.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\java.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\javaw.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\jawt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\jdwp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\jjs.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\jli.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\jpeg.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\jsdt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\jsound.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\jsoundds.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\lcms.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\management.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\mlib_image.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\msvcr100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\net.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\nio.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\npt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\pack200.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\server\Xusage.txt
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\server\jvm.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\splashscreen.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\sunec.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\sunmscapi.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\verify.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\w2k_lsa_auth.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\windowslauncher.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\zip.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\accessibility.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\amd64\jvm.cfg
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\calendars.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\charsets.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\charsets.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\classlist
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\cmm\CIEXYZ.pf
Microsoft color profile 2.3, type lcms, XYZ/XYZ-abst device by lcms, 784 bytes, 28-12-2006 18:07:22, no copyright tag "lcms XYZ identity"
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\cmm\GRAY.pf
Microsoft color profile 2.3, type lcms, GRAY/XYZ-mntr device by lcms, 556 bytes, 28-12-2006 18:07:22, no copyright tag "lcms gray virtual profile"
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\cmm\LINEAR_RGB.pf
ColorSync color profile 2.3, type lcms, RGB/XYZ-mntr device by lcms, 488 bytes, 28-3-2008 14:24:37, transparent, relative colorimetric "linear sRGB"
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\cmm\PYCC.pf
ColorSync color profile 4.0, type lcms, 3CLR/XYZ-spac device by lcms, 234080 bytes, 10-4-2008 10:24:22, transparent, relative colorimetric, 0xf0e75c55d21e4d8c MD5 'PYCC from PCD 045'
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\cmm\sRGB.pf
Microsoft color profile 2.3, type lcms, RGB/XYZ-mntr device by lcms, 6876 bytes, 28-12-2006 18:07:22, no copyright tag "sRGB built-in"
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\content-types.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\crs-agent.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\crs-agent.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\currency.data
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\access-bridge-64.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\access-bridge-64.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\cldrdata.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\cldrdata.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\jaccess.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\jaccess.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\legacy8ujsse.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\legacy8ujsse.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\meta-index
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\openjsse.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\openjsse.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\sunec.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\sunjce_provider.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\sunmscapi.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\sunmscapi.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\sunpkcs11.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\sunpkcs11.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\flavormap.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\fontconfig.bfc
raw G3 (Group 3) FAX
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\fontconfig.properties.src
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\hijrah-config-umalqura.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\images\cursors\cursors.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\images\cursors\invalid32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\images\cursors\win32_CopyDrop32x32.gif
GIF image data, version 89a, 31 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\images\cursors\win32_CopyNoDrop32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\images\cursors\win32_LinkDrop32x32.gif
GIF image data, version 89a, 31 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\images\cursors\win32_LinkNoDrop32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\images\cursors\win32_MoveDrop32x32.gif
GIF image data, version 89a, 31 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\images\cursors\win32_MoveNoDrop32x32.gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\jce.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\jsse.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\jsse.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\jvm.hprof.txt
Algol 68 source, ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\logging.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\management-agent.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\management\jmxremote.access
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\management\jmxremote.password.template
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\management\management.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\management\snmp.acl.template
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\meta-index
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\net.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\psfont.properties.ja
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\psfontj2d.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\resources.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\rt.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\rt.jar.p2
JAR compressed with pack200, version -85.0
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\security\blacklisted.certs
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\security\cacerts
Java KeyStore
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\security\java.policy
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\security\java.security
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\security\legacy8ujsse.security
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\security\openjsse.security
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\security\policy\limited\US_export_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\security\policy\limited\local_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\security\policy\unlimited\US_export_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\security\policy\unlimited\local_policy.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\sound.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\tzdb.dat
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\tzmappings
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\readme.txt
ASCII text, with very long lines (347)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\release
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\JWAppNote-JWrapperJreCompatibilityApp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\JWAppSpec-AutoTest
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\JWAppSpec-JWrapperJreCompatibilityApp
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\JWAppSpec-JWrapperMatchedVersionServerUnavailable
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\JWAppSpec-JWrapper_Service_Management_App
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\JWAppSpec-Remote_Support
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\JWrapper-Remote Support-ICNS.icns
Mac OS X icon, 118432 bytes, "is32" type
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\JWrapper-Remote Support-UninstallerICO.icopng
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\JWrapper-Remote Support-splash.png
PNG image data, 352 x 72, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\JWrapperLaunch
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\JWrapperUseJRE
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\Remote SupportWinLauncher.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\customer-jar-with-dependencies.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\customer-jar-with-dependencies.p2 (copy)
Java archive data (JAR)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\elev_mac
Mach-O universal binary with 3 architectures: [i386:\012- Mach-O i386 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|NO_HEAP_EXECUTION>] [x86_64:Mach-O 64-bit x86_64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL>] [arm64:Mach-O 64-bit arm64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|PIE>]
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\elev_win.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\fontconfig.properties
ASCII text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\jwBuildVersion
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\jwrapper_license
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\jwutils_win64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\session_win.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\translations\da.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\translations\de.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\translations\es.txt
Unicode text, UTF-8 text, with very long lines (315)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\translations\fr.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\translations\it.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\translations\nl.txt
Unicode text, UTF-8 text, with very long lines (305)
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\translations\pt.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\translations\sv.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\unrestricted\JWLaunchProperties-1716525082986-0
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\unrestricted\JWrapperUseJRE
data
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\logs\GenericUpdater-2024-05-24-00-31-10-314-pid0.log
ASCII text, with very long lines (1106), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\logs\Remote Support-JWrapperJreCompatibilityApp-2024-05-24-00-30-25-165-pid6632.log
ASCII text, with very long lines (1686), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\logs\Remote Support-Remote Support-2024-05-24-00-30-26-639-pid2536.log
ASCII text, with very long lines (1686), with CRLF, LF line terminators
modified
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\logs\Wrapper-2024-05-24-00-28-59-233.log
ASCII text, with very long lines (384), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Windows\Temp\hsperfdata_user-PC$\3588
data
dropped
C:\Windows\Temp\hsperfdata_user-PC$\7008
data
dropped
There are 228 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W64.Remsim.A.gen.Eldorado.3236.10370.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W64.Remsim.A.gen.Eldorado.3236.10370.exe"
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Remote Support.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Remote Support.exe" -cp "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" -Xmx512m -Xms5m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2,TLSv1.3 -Dsun.awt.fontconfig=fontconfig.properties jwrapper.JWrapper "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\unrestricted\JWLaunchProperties-1716525085517-3"
malicious
C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe
"C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe" "-install" "C:\ProgramData\SimpleHelp\ElevateSH\MMoveLauncher3601372218457082792.service"
malicious
C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe
"C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe"
malicious
C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe
"C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe" -uninstallbyname ShTemporaryService4057650
malicious
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\crs-agent.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\crs-agent.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\charsets.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\charsets.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\jsse.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\jsse.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\jaccess.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\jaccess.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\sunpkcs11.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\sunpkcs11.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\openjsse.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\openjsse.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\legacy8ujsse.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\legacy8ujsse.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\cldrdata.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\cldrdata.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\access-bridge-64.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\access-bridge-64.jar"
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\sunmscapi.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\ext\sunmscapi.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\unpack200.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\rt.jar.p2" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\lib\rt.jar"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\windowslauncher.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\windowslauncher.exe" "-Xshare:dump"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Remote SupportECompatibility.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Remote SupportECompatibility.exe" -cp "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\customer-jar-with-dependencies.jar" -Xmx512m -Xms5m -XX:MinHeapFreeRatio=15 -XX:MaxHeapFreeRatio=30 -Djava.util.Arrays.useLegacyMergeSort=true -Djava.net.preferIPv4Stack=true -Dsun.java2d.dpiaware=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2,TLSv1.3 -Dsun.awt.fontconfig=fontconfig.properties jwrapper.JWrapper "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525071752-5\unrestricted\JWLaunchProperties-1716525082986-0"
C:\Windows\System32\icacls.exe
icacls "C:\ProgramData\SimpleHelp" /t /c /grant *S-1-1-0:(OI)(CI)F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\icacls.exe
icacls "C:\ProgramData\SimpleHelp\ElevateSH" /t /c /grant *S-1-5-32-545:(OI)(CI)F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\icacls.exe
icacls "C:\ProgramData\SimpleHelp\ElevateSH\*.*" /t /c /grant *S-1-1-0:(OI)(CI)F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\ProgramData\SimpleHelp\ElevateSH\elev_win.exe
C:\ProgramData\SimpleHelp\ElevateSH\elev_win.exe C:\ProgramData\SimpleHelp\ElevateSH\elev_win.exe C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe -install C:\ProgramData\SimpleHelp\ElevateSH\MMoveLauncher3601372218457082792.service
C:\ProgramData\SimpleHelp\ElevateSH\elev_win.exe
"C:\ProgramData\SimpleHelp\ElevateSH\elev_win.exe" "C:\ProgramData\SimpleHelp\ElevateSH\SimpleService.exe" "-install" "C:\ProgramData\SimpleHelp\ElevateSH\MMoveLauncher3601372218457082792.service"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\session_win.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\session_win.exe" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\windowslauncher.exe" "-cp" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" "-Xmx128m" "-Xms5m" "-Dsun.java2d.dpiaware=true" "-Djava.library.path=C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete" "com.aem.sdesktop.util.MouseMover" "127.0.0.1" "49748" "127.0.0.1" "49749" "elevated"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapperTemp-1716525001-6-app\bin\windowslauncher.exe
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\windowslauncher.exe" "-cp" "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" "-Xmx128m" "-Xms5m" "-Dsun.java2d.dpiaware=true" "-Djava.library.path=C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete" "com.aem.sdesktop.util.MouseMover" "127.0.0.1" "49748" "127.0.0.1" "49749" "elevated"
C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Session Elevation Helper
"C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Windows64JRE-00084000053-complete\bin\Session Elevation Helper" -cp "C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete\customer-jar-with-dependencies.jar" -Xmx128m -Xms5m -Dsun.java2d.dpiaware=true "-Djava.library.path=C:\Users\user\AppData\Roaming\JWrapper-Remote Support\JWrapper-Remote Support-00102236241-complete" com.aem.sdesktop.util.MouseMover 127.0.0.1 49752 127.0.0.1 49753 elevated_backup
There are 20 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://help.qxl.ca/branding/brandingfiles?a=3
162.251.192.7
malicious
http://help.qxl.ca/customer/JWrapper-Remote%20Support_winutils64-version.txt
162.251.192.7
malicious
http://help.qxl.ca/customer/JWrapper-Remote%20Support_os_jwwin64-00102236241-archive.p2.l2
162.251.192.7
malicious
http://help.qxl.ca/customer/JWrapper-Windows64JRE-00084000053-archive.p2.l2
162.251.192.7
malicious
http://help.qxl.ca/customer/JWrapper-Remote%20Support-00102236241-archive.p2.l2
162.251.192.7
malicious
http://help.qxl.ca/simplehelpdetails.txt
162.251.192.7
malicious
http://help.qxl.ca/customer/JWrapper-Remote%20Support_winutils64-00102236241-archive.p2.l2
162.251.192.7
malicious
http://help.qxl.ca/customer/JWrapper-Remote%20Support-version.txt
162.251.192.7
malicious
http://api.kaixin001.com/oauth2/authorize
unknown
http://pdfbox.apache.org/
unknown
http://www.simple-help.com/revoked_license_69?name=Travis_Gundolff?date=2012_02_09?version=5-4?time=
unknown
http://maven.apache.org/POM/4.0.0
unknown
https://simple-help.com/shnotbeproc
unknown
http://www.simple-help.com/revoked_license_35?name=S_ne_Trepp?date=2011_03_03?version=5-4?time=
unknown
http://www.simple-help.com/revoked_license_80?name=Scott_Stenhouse?date=1970_01_01?version=5-4?time=
unknown
https://preview.account.thethingsnetwork.org/users/authorize
unknown
http://www.simple-help.com/revoked_license_15?name=Gregory_Cawood?date=2009_04_26?version=5-4?time=
unknown
http://www.meetup.com/authenticate
unknown
http://0.0.254.254
unknown
https://issues.apache.org/jira/secure/attachment/12784025/PDFBOX-3208-L33MUTT2SVCWGCS6UIYL5TH3PNPXHI
unknown
https://github.com/login/oauth/authorize
unknown
https://issues.apache.org/jira/secure/attachment/12966453/cryptfilter.pdf
unknown
https://app.asana.com/-/oauth_authorize
unknown
http://api.meetup.com/oauth/request/
unknown
http://www.simple-help.com/revoked_license_61?name=Charles_Hamilton?date=2011_09_18?version=5-4?time
unknown
https://www.dropbox.com/oauth2/authorize
unknown
https://meta.wikimedia.beta.wmflabs.org/w/index.php
unknown
https://issues.apache.org/jira/secure/attachment/12991833/PDFBOX-4750-test.pdf
unknown
http://www.simple-help.com/revoked_license_33?name=James_Hopkins?date=2013_03_05?version=5-4?time=
unknown
https://api.twitter.com/oauth/authenticate
unknown
http://www.freelancer.com/users/api-token/auth.php
unknown
http://www.simple-help.com/revoked_license_40?name=Paul_Andersen?date=2008_05_24?version=5-4?time=
unknown
https://maven.apache.org/xsd/maven-4.0.0.xsd
unknown
https://sh54.simplehelp.io
unknown
https://auth.aweber.com/1.0/oauth/access_token
unknown
https://outlook.office.com/SMTP.Send
unknown
http://profile.tut.by/auth
unknown
https://issues.apache.org/jira/secure/attachment/12962991/NeS1078.pdf
unknown
http://www.simple-help.com/revoked_license_50?name=David_Schaefer?date=2014_08_25?version=5-4?time=
unknown
http://svn.apache.org/repos/asf/commons/proper/logging/trunk
unknown
https://issues.apache.org/jira/secure/attachment/12914331/WXMDXCYRWFDCMOSFQJ5OAJIAFXYRZ5OA.pdf
unknown
http://www.unicode.org/cldr/data/.
unknown
https://issues.apache.org/jira/secure/attachment/12896461/NotoEmoji-Regular.ttf
unknown
http://www.simple-help.com/revoked_license_4?name=Digital_Mayhem?date=2008_05_24?version=5-4?time=
unknown
https://oauth.vk.com/access_token
unknown
https://api.imgur.com/oauth2/token
unknown
https://api.xing.com/v1/access_token
unknown
http://www.simple-help.com/revoked_license_83?name=Matthijs_Holtkamp_HI_computers?date=2010_10_28?ve
unknown
https://secure.comodo.com/CPS0L
unknown
https://api.skyrock.com/v2
unknown
http://docs.azul.com/zulu/zulurelnotes/
unknown
http://www.myserver.com:443
unknown
http://www.gnu.org/copyleft/gpl.html
unknown
https://connect.mail.ru/oauth/token
unknown
https://kauth.kakao.com/oauth/token
unknown
https://accounts.automatic.com/oauth/authorize
unknown
http://www.apache.org/).
unknown
https://auth.doktornarabote.ru/OAuth/Token
unknown
https://account.thethingsnetwork.org/users/token
unknown
https://stackexchange.com/oauth/access_token
unknown
https://issues.apache.org/jira/secure/attachment/13025718/lotus.jpg
unknown
http://help.qxl.ca/customer/JWrapper-Windows64JRE-version.txt?time=2832989348.ca
unknown
http://www.simple-help.com/revoked_license_60?name=Alfred_Hamilton?date=2014_10_25?version=5-4?time=
unknown
http://digg.com/oauth/authorize
unknown
http://www.simple-help.com/revoked_license_11?name=Ray_Traeger?date=2010_10_27?version=5-4?time=
unknown
http://www.simple-help.com/revoked_license_53?name=Tyson_Clark?date=2012_05_16?version=5-4?time=
unknown
http://www.oasis-open.org/policies-guidelines/ipr
unknown
http://www.simple-help.com/revoked_license_68?name=John_Black?date=2012_08_30?version=5-4?time=
unknown
http://www.sandbox.freelancer.com/users/api-token/auth.php
unknown
https://graph.instagram.com/refresh_access_token
unknown
http://rbarraza.com/graphics/shadowCurve.png
unknown
https://www.tumblr.com/oauth/request_token
unknown
http://www.simple-help.com/revoked_license_64?name=Network_Corp_X_Inc?date=2008_12_19?version=5-4?ti
unknown
http://www.simple-help.com/revoked_license_42?name=Lee_Watson?date=2010_11_02?version=5-4?time=
unknown
http://www.unicode.org/reports/
unknown
https://git-wip-us.apache.org/repos/asf/pdfbox-docs//content/docs/$
unknown
http://www.simple-help.com/revoked_license_92?name=Donovan_Hoare?date=2011_03_24?version=5-4?time=
unknown
https://issues.apache.org/jira/secure/attachment/12929821/16bit.png
unknown
https://mail.google.com/
unknown
https://issues.apache.org/jira/secure/attachment/12490774/a.pdf
unknown
https://meta.wikimedia.beta.wmflabs.org/wiki/
unknown
https://issues.apache.org/jira/secure/attachment/12481684/2.pdf
unknown
http://help.qxl.ca/customer/JWrapper-Windows64JRE-version.txt?time=2832989348TEM32
unknown
https://api.login.yahoo.com/oauth/v2/request_auth
unknown
https://www.thawte.com/cps0/
unknown
https://secure.meetup.com/oauth2/access
unknown
https://www.thawte.com/repository0W
unknown
http://services.digg.com/oauth/access_token
unknown
https://connect.mail.ru/oauth/authorize
unknown
https://issues.apache.org/jira/secure/attachment/12486526/2_testfile1.pdf
unknown
http://www.myserver.com:443:
unknown
https://issues.apache.org/jira/secure/attachment/12952086/form.pdf
unknown
https://issues.apache.org/jira/secure/attachment/12867113/202097.pdf
unknown
http://hc.apache.org/httpcomponents-core-ga
unknown
http://www.unicode.org/copyright.html.
unknown
http://upx.tsx.org
unknown
http://www.azul.com
unknown
http://www.simple-help.com/revoked_license_55?name=Sarah_Wagner?date=2204_01_29?version=5-4?time=
unknown
http://www.simple-help.com/revoked_license_65?name=Richard_Pulver?date=2013_08_14?version=5-4?time=
unknown
https://issues.apache.org/jira/secure/attachment/12890034/EUWO6SQS5TM4VGOMRD3FLXZHU35V2CP2.pdf
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
help.qxl.ca
162.251.192.7
malicious

IPs

IP
Domain
Country
Malicious
162.251.192.7
help.qxl.ca
Canada
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\ShTemporaryService4057650
NULL
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ShTemporaryService4057650\Parameters
workingdir
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ShTemporaryService4057650\Parameters
cmdline
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ShTemporaryService4057650\Parameters
auto_restart
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ShTemporaryService4057650\Parameters
run_once
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ShTemporaryService4057650\Parameters
do_cad

Memdumps

Base Address
Regiontype
Protect
Malicious
BBE000
heap
page read and write
160A000
heap
page read and write
D68000
heap
page read and write
DCF000
heap
page read and write
964000
heap
page read and write
666F7000
unkown
page read and write
D75000
heap
page read and write
DE0000
heap
page read and write
15D1000
heap
page read and write
278A000
heap
page read and write
DE3000
heap
page read and write
1D132000
heap
page read and write
1AC9000
heap
page read and write
1AC60000
heap
page read and write
C28000
heap
page read and write
1D10C000
heap
page read and write
C33000
heap
page read and write
E01000
heap
page read and write
90A000
heap
page read and write
D4F000
heap
page read and write
D98000
heap
page read and write
1AF1000
heap
page read and write
DBC000
heap
page read and write
938000
heap
page read and write
1606000
heap
page read and write
DFC000
heap
page read and write
7FF71863F000
unkown
page readonly
DFC000
heap
page read and write
D6F000
heap
page read and write
DAD000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
D93000
heap
page read and write
1AD0D000
heap
page read and write
B58000
heap
page read and write
141D000
heap
page read and write
DE0000
heap
page read and write
1830000
heap
page read and write
E01000
heap
page read and write
1377000
heap
page read and write
DE6000
heap
page read and write
276E000
heap
page read and write
D8B000
heap
page read and write
DE5000
heap
page read and write
D60000
heap
page read and write
122D000
heap
page read and write
C2D000
heap
page read and write
D60000
heap
page read and write
D30000
heap
page read and write
277E000
heap
page read and write
94C000
heap
page read and write
1A56F000
heap
page read and write
94C000
heap
page read and write
94C000
heap
page read and write
94C000
heap
page read and write
160C000
heap
page read and write
D50000
heap
page read and write
15FD000
heap
page read and write
E01000
heap
page read and write
B74000
heap
page read and write
1B39000
heap
page read and write
964000
heap
page read and write
DF4000
heap
page read and write
DD0000
heap
page read and write
15C2000
heap
page read and write
1B75000
heap
page read and write
160C000
heap
page read and write
2A04000
heap
page read and write
928000
heap
page read and write
2442000
trusted library allocation
page read and write
E01000
heap
page read and write
950000
heap
page read and write
96F000
heap
page read and write
DF0000
heap
page read and write
950000
heap
page read and write
196D000
heap
page read and write
1B18000
heap
page read and write
DE6000
heap
page read and write
15FD000
heap
page read and write
DD0000
heap
page read and write
964000
heap
page read and write
23F2000
trusted library allocation
page read and write
DE5000
heap
page read and write
1AF1000
heap
page read and write
1AC3000
heap
page read and write
C11000
heap
page read and write
DF0000
heap
page read and write
98A000
heap
page read and write
2A3F000
heap
page read and write
95D000
heap
page read and write
1AFD000
heap
page read and write
1ACF6000
heap
page read and write
2423000
trusted library allocation
page read and write
B6C000
heap
page read and write
1B1F000
heap
page read and write
B68000
heap
page read and write
1AE1000
heap
page read and write
11A3000
heap
page read and write
DAC000
heap
page read and write
1377000
heap
page read and write
1B38000
heap
page read and write
DE3000
heap
page read and write
400000
heap
page read and write
94B000
heap
page read and write
E01000
heap
page read and write
DE6000
heap
page read and write
1502000
heap
page read and write
15E1000
heap
page read and write
953000
heap
page read and write
992000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
B7D000
heap
page read and write
2442000
trusted library allocation
page read and write
C28000
heap
page read and write
1388000
heap
page read and write
93D000
heap
page read and write
C02000
heap
page read and write
940000
heap
page read and write
DE6000
heap
page read and write
1623000
heap
page read and write
1B48000
heap
page read and write
D5F000
heap
page read and write
15F6000
heap
page read and write
242A000
trusted library allocation
page read and write
DE3000
heap
page read and write
964000
heap
page read and write
DE0000
heap
page read and write
E01000
heap
page read and write
12AD000
heap
page read and write
DBC000
heap
page read and write
1AE6000
heap
page read and write
D83000
heap
page read and write
DFC000
heap
page read and write
DD0000
heap
page read and write
DE0000
heap
page read and write
1B11E000
heap
page read and write
1B1F000
heap
page read and write
D7F000
heap
page read and write
D6F000
heap
page read and write
16EA000
heap
page read and write
1AF51000
heap
page read and write
1B14000
heap
page read and write
1AD8000
heap
page read and write
160A000
heap
page read and write
1AF03000
heap
page read and write
B7E000
heap
page read and write
1B1C000
heap
page read and write
B7E000
heap
page read and write
15CD000
heap
page read and write
1858000
heap
page read and write
121C000
heap
page read and write
D5F000
heap
page read and write
1B22000
heap
page read and write
9C5000
heap
page read and write
D68000
heap
page read and write
98A000
heap
page read and write
E01000
heap
page read and write
5282000
heap
page read and write
DE3000
heap
page read and write
C0D000
heap
page read and write
B68000
heap
page read and write
9C5000
heap
page read and write
87B000
heap
page read and write
D68000
heap
page read and write
94B000
heap
page read and write
2442000
trusted library allocation
page read and write
1AF3C000
heap
page read and write
279F000
heap
page read and write
1B06000
heap
page read and write
DF4000
heap
page read and write
928000
heap
page read and write
928000
heap
page read and write
DAC000
heap
page read and write
DCF000
heap
page read and write
C02000
heap
page read and write
1B06000
heap
page read and write
1D132000
heap
page read and write
3903000
heap
page read and write
DF0000
heap
page read and write
1AF60000
heap
page read and write
94C000
heap
page read and write
7FF718632000
unkown
page readonly
1D11A000
heap
page read and write
DFC000
heap
page read and write
DE0000
heap
page read and write
1AE1000
heap
page read and write
B7E000
heap
page read and write
1AFD000
heap
page read and write
1AE1000
heap
page read and write
2423000
trusted library allocation
page read and write
C49000
heap
page read and write
DCF000
heap
page read and write
1BC5000
heap
page read and write
DAD000
heap
page read and write
DE0000
heap
page read and write
DCF000
heap
page read and write
1D112000
heap
page read and write
162F000
heap
page read and write
2793000
heap
page read and write
C12000
heap
page read and write
E01000
heap
page read and write
23DA000
trusted library allocation
page read and write
957000
heap
page read and write
D70000
heap
page read and write
DF4000
heap
page read and write
DAD000
heap
page read and write
DFC000
heap
page read and write
950000
heap
page read and write
96F000
heap
page read and write
1B11E000
heap
page read and write
D5F000
heap
page read and write
1281000
heap
page read and write
2423000
trusted library allocation
page read and write
B7E000
heap
page read and write
DBC000
heap
page read and write
1900000
heap
page read and write
DD0000
heap
page read and write
9A9000
heap
page read and write
7FF718640000
unkown
page read and write
DFC000
heap
page read and write
C35000
heap
page read and write
C28000
heap
page read and write
1B09B000
heap
page read and write
B74000
heap
page read and write
7FF718632000
unkown
page readonly
B58000
heap
page read and write
D60000
heap
page read and write
DAC000
heap
page read and write
1429000
heap
page read and write
15E2000
heap
page read and write
9A9000
heap
page read and write
1D06E000
heap
page read and write
C35000
heap
page read and write
1AE1000
heap
page read and write
93D000
heap
page read and write
2797000
heap
page read and write
DCF000
heap
page read and write
B4C000
heap
page read and write
BF2000
heap
page read and write
D73000
heap
page read and write
DE3000
heap
page read and write
C9E000
heap
page read and write
D31000
heap
page read and write
B7D000
heap
page read and write
D77000
heap
page read and write
1B14000
heap
page read and write
DD0000
heap
page read and write
1221000
heap
page read and write
C00000
heap
page read and write
D93000
heap
page read and write
DF0000
heap
page read and write
D48000
heap
page read and write
B86000
heap
page read and write
5C80000
heap
page read and write
400000
unkown
page readonly
B80000
heap
page read and write
1623000
heap
page read and write
94C000
heap
page read and write
DBC000
heap
page read and write
E01000
heap
page read and write
185F000
heap
page read and write
DE0000
heap
page read and write
23DA000
trusted library allocation
page read and write
DAC000
heap
page read and write
D98000
heap
page read and write
D8B000
heap
page read and write
1AF1000
heap
page read and write
7FF718641000
unkown
page readonly
B7E000
heap
page read and write
29E1000
heap
page read and write
C35000
heap
page read and write
C01000
heap
page read and write
DBC000
heap
page read and write
121A000
heap
page read and write
1AE62000
heap
page read and write
953000
heap
page read and write
DF4000
heap
page read and write
242A000
trusted library allocation
page read and write
1ADE8000
heap
page read and write
1B2B000
heap
page read and write
DBC000
heap
page read and write
953000
heap
page read and write
B86000
heap
page read and write
666D1000
unkown
page readonly
D93000
heap
page read and write
2423000
trusted library allocation
page read and write
242A000
trusted library allocation
page read and write
D77000
heap
page read and write
D70000
heap
page read and write
1A4AB000
heap
page read and write
D5F000
heap
page read and write
2423000
trusted library allocation
page read and write
278A000
heap
page read and write
16F8000
heap
page read and write
1B22000
heap
page read and write
78F000
stack
page read and write
1B58000
heap
page read and write
D30000
heap
page read and write
B4C000
heap
page read and write
DCF000
heap
page read and write
DF0000
heap
page read and write
1AE5000
heap
page read and write
D83000
heap
page read and write
DCF000
heap
page read and write
160A000
heap
page read and write
29DD000
heap
page read and write
DFC000
heap
page read and write
B84000
heap
page read and write
D84000
heap
page read and write
188D000
heap
page read and write
7C0000
heap
page read and write
1438000
heap
page read and write
2793000
heap
page read and write
B49000
heap
page read and write
D4F000
heap
page read and write
DE5000
heap
page read and write
DF4000
heap
page read and write
1B1C000
heap
page read and write
DE0000
heap
page read and write
DD0000
heap
page read and write
DF4000
heap
page read and write
15D1000
heap
page read and write
B74000
heap
page read and write
DF4000
heap
page read and write
DE3000
heap
page read and write
66706000
unkown
page readonly
160C000
heap
page read and write
1791000
heap
page read and write
964000
heap
page read and write
DE3000
heap
page read and write
7FF718641000
unkown
page readonly
DAC000
heap
page read and write
1606000
heap
page read and write
DF4000
heap
page read and write
938000
heap
page read and write
D7F000
heap
page read and write
DE0000
heap
page read and write
163E000
heap
page read and write
E01000
heap
page read and write
DCB000
heap
page read and write
1718000
heap
page read and write
D7F000
heap
page read and write
940000
heap
page read and write
B49000
heap
page read and write
D73000
heap
page read and write
1AB8000
heap
page read and write
B58000
heap
page read and write
277E000
heap
page read and write
E01000
heap
page read and write
1D1A2000
heap
page read and write
1AE5000
heap
page read and write
7FF718611000
unkown
page execute read
DF0000
heap
page read and write
1B106000
heap
page read and write
964000
heap
page read and write
1AF5000
heap
page read and write
D77000
heap
page read and write
1B17000
heap
page read and write
2750000
heap
page read and write
1AFCB000
heap
page read and write
DAC000
heap
page read and write
23D3000
trusted library allocation
page read and write
D98000
heap
page read and write
DD0000
heap
page read and write
D6D000
heap
page read and write
1B2B000
heap
page read and write
D30000
heap
page read and write
279F000
heap
page read and write
B74000
heap
page read and write
1D085000
heap
page read and write
B74000
heap
page read and write
C49000
heap
page read and write
1981000
heap
page read and write
D30000
heap
page read and write
964000
heap
page read and write
1B2B000
heap
page read and write
279F000
heap
page read and write
1AED000
heap
page read and write
1AC64000
heap
page read and write
B74000
heap
page read and write
E01000
heap
page read and write
D98000
heap
page read and write
B74000
heap
page read and write
D77000
heap
page read and write
D6D000
heap
page read and write
D91000
heap
page read and write
B69000
heap
page read and write
B7D000
heap
page read and write
29DD000
heap
page read and write
372E000
heap
page read and write
15FD000
heap
page read and write
1AC95000
heap
page read and write
B7D000
heap
page read and write
1606000
heap
page read and write
94C000
heap
page read and write
DE6000
heap
page read and write
DF0000
heap
page read and write
C1C000
heap
page read and write
1606000
heap
page read and write
E01000
heap
page read and write
277E000
heap
page read and write
D68000
heap
page read and write
DCB000
heap
page read and write
666D1000
unkown
page readonly
C49000
heap
page read and write
C28000
heap
page read and write
B4C000
heap
page read and write
D6B000
heap
page read and write
B58000
heap
page read and write
279F000
heap
page read and write
1B2B000
heap
page read and write
D30000
heap
page read and write
1CFBF000
heap
page read and write
93C000
heap
page read and write
DFC000
heap
page read and write
16D7000
heap
page read and write
91C000
heap
page read and write
242A000
trusted library allocation
page read and write
1D1EF000
heap
page read and write
1B14000
heap
page read and write
DAC000
heap
page read and write
C35000
heap
page read and write
DFC000
heap
page read and write
D30000
heap
page read and write
1A51E000
heap
page read and write
1AE1000
heap
page read and write
1AE1000
heap
page read and write
29E1000
heap
page read and write
DAC000
heap
page read and write
DE0000
heap
page read and write
2442000
trusted library allocation
page read and write
B6A000
heap
page read and write
943000
heap
page read and write
D24000
heap
page read and write
DE0000
heap
page read and write
964000
heap
page read and write
DF0000
heap
page read and write
1AEC000
heap
page read and write
92C000
heap
page read and write
12E1000
heap
page read and write
B84000
heap
page read and write
D73000
heap
page read and write
15B1000
heap
page read and write
C28000
heap
page read and write
D83000
heap
page read and write
953000
heap
page read and write
964000
heap
page read and write
BD7000
heap
page read and write
279F000
heap
page read and write
BAE000
heap
page read and write
D6D000
heap
page read and write
943000
heap
page read and write
23DA000
trusted library allocation
page read and write
DF4000
heap
page read and write
666FA000
unkown
page readonly
23D3000
trusted library allocation
page read and write
C02000
heap
page read and write
B59000
heap
page read and write
DE5000
heap
page read and write
1B20000
heap
page read and write
12C5000
heap
page read and write
15C2000
heap
page read and write
DD0000
heap
page read and write
2794000
heap
page read and write
B84000
heap
page read and write
DE0000
heap
page read and write
DF0000
heap
page read and write
D0E000
heap
page read and write
DD0000
heap
page read and write
1AD2000
heap
page read and write
1AD9000
heap
page read and write
1B12D000
heap
page read and write
DE3000
heap
page read and write
C2D000
heap
page read and write
16E4000
heap
page read and write
93B000
heap
page read and write
D93000
heap
page read and write
1AE5000
heap
page read and write
B58000
heap
page read and write
C13000
heap
page read and write
D83000
heap
page read and write
D50000
heap
page read and write
1B2B000
heap
page read and write
964000
heap
page read and write
242A000
trusted library allocation
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
947000
heap
page read and write
964000
heap
page read and write
B59000
heap
page read and write
E01000
heap
page read and write
1AFD000
heap
page read and write
279A000
heap
page read and write
D83000
heap
page read and write
4C7D000
heap
page read and write
953000
heap
page read and write
DCF000
heap
page read and write
1B12D000
heap
page read and write
29DD000
heap
page read and write
15A8000
heap
page read and write
DAC000
heap
page read and write
D93000
heap
page read and write
D6B000
heap
page read and write
DFC000
heap
page read and write
DE6000
heap
page read and write
7FF718611000
unkown
page execute read
2423000
trusted library allocation
page read and write
2442000
trusted library allocation
page read and write
101D000
heap
page read and write
9A9000
heap
page read and write
1AF38000
heap
page read and write
1B2B000
heap
page read and write
B5B000
heap
page read and write
DF0000
heap
page read and write
D31000
heap
page read and write
1AECF000
heap
page read and write
E79000
heap
page read and write
C2D000
heap
page read and write
D84000
heap
page read and write
B5B000
heap
page read and write
1AEB4000
heap
page read and write
160C000
heap
page read and write
279F000
heap
page read and write
DE6000
heap
page read and write
C49000
heap
page read and write
B84000
heap
page read and write
C02000
heap
page read and write
DD0000
heap
page read and write
D6F000
heap
page read and write
276E000
heap
page read and write
1AC62000
heap
page read and write
1B2B000
heap
page read and write
1B14000
heap
page read and write
1B2B000
heap
page read and write
E01000
heap
page read and write
C35000
heap
page read and write
29DD000
heap
page read and write
1B14000
heap
page read and write
B86000
heap
page read and write
957000
heap
page read and write
DF4000
heap
page read and write
9A9000
heap
page read and write
15CD000
heap
page read and write
1AC3000
heap
page read and write
9A5000
heap
page read and write
DCF000
heap
page read and write
D77000
heap
page read and write
DBC000
heap
page read and write
DCB000
heap
page read and write
242A000
trusted library allocation
page read and write
B6C000
heap
page read and write
1B06000
heap
page read and write
964000
heap
page read and write
1B48000
heap
page read and write
1ABF000
heap
page read and write
C11000
heap
page read and write
C33000
heap
page read and write
12C5000
heap
page read and write
D98000
heap
page read and write
279F000
heap
page read and write
D8B000
heap
page read and write
D70000
heap
page read and write
2442000
trusted library allocation
page read and write
18D9000
heap
page read and write
1AE4000
heap
page read and write
1405000
heap
page read and write
277E000
heap
page read and write
1B05000
heap
page read and write
D4F000
heap
page read and write
C49000
heap
page read and write
B4D000
heap
page read and write
D7F000
heap
page read and write
D84000
heap
page read and write
23DA000
trusted library allocation
page read and write
E01000
heap
page read and write
1AFD000
heap
page read and write
275C000
heap
page read and write
93F000
heap
page read and write
D50000
heap
page read and write
C35000
heap
page read and write
937000
heap
page read and write
C49000
heap
page read and write
938000
heap
page read and write
4A8000
heap
page read and write
DF0000
heap
page read and write
BF3000
heap
page read and write
1AF60000
heap
page read and write
DFC000
heap
page read and write
DCF000
heap
page read and write
1820000
heap
page read and write
DE5000
heap
page read and write
9A9000
heap
page read and write
1A32F000
heap
page read and write
1AA4000
heap
page read and write
1AE1000
heap
page read and write
2769000
heap
page read and write
DE0000
heap
page read and write
964000
heap
page read and write
94C000
heap
page read and write
1AEB000
heap
page read and write
938000
heap
page read and write
242A000
trusted library allocation
page read and write
DCF000
heap
page read and write
1B106000
heap
page read and write
1AFE2000
heap
page read and write
1B2B000
heap
page read and write
B58000
heap
page read and write
1B2B000
heap
page read and write
C28000
heap
page read and write
1B1C000
heap
page read and write
DD0000
heap
page read and write
1276000
heap
page read and write
23F2000
trusted library allocation
page read and write
DCF000
heap
page read and write
1905000
heap
page read and write
B86000
heap
page read and write
1B23000
heap
page read and write
1B2C000
heap
page read and write
1AF5000
heap
page read and write
1AF1000
heap
page read and write
D8B000
heap
page read and write
D91000
heap
page read and write
1ACC5000
heap
page read and write
23D3000
trusted library allocation
page read and write
947000
heap
page read and write
D15000
heap
page read and write
DCF000
heap
page read and write
D29000
heap
page read and write
D7C000
heap
page read and write
C49000
heap
page read and write
14D2000
heap
page read and write
1B2B000
heap
page read and write
160C000
heap
page read and write
1377000
heap
page read and write
D73000
heap
page read and write
DF4000
heap
page read and write
FF9000
heap
page read and write
93B000
heap
page read and write
DBC000
heap
page read and write
DCB000
heap
page read and write
DFC000
heap
page read and write
D73000
heap
page read and write
D77000
heap
page read and write
1429000
heap
page read and write
D30000
heap
page read and write
928000
heap
page read and write
242A000
trusted library allocation
page read and write
1828000
heap
page read and write
664000
heap
page read and write
C2D000
heap
page read and write
1B06000
heap
page read and write
DCF000
heap
page read and write
D8B000
heap
page read and write
DAC000
heap
page read and write
1B22F000
heap
page read and write
5F9000
heap
page read and write
1AE69000
heap
page read and write
C49000
heap
page read and write
D2C000
heap
page read and write
C35000
heap
page read and write
DFC000
heap
page read and write
23DA000
trusted library allocation
page read and write
E01000
heap
page read and write
9C5000
heap
page read and write
D8B000
heap
page read and write
1B14000
heap
page read and write
1966000
heap
page read and write
DE3000
heap
page read and write
2442000
trusted library allocation
page read and write
D68000
heap
page read and write
666FA000
unkown
page readonly
B7D000
heap
page read and write
DAC000
heap
page read and write
C1E000
heap
page read and write
D8B000
heap
page read and write
C94000
heap
page read and write
992000
heap
page read and write
C41000
heap
page read and write
D98000
heap
page read and write
D31000
heap
page read and write
1B06000
heap
page read and write
C28000
heap
page read and write
DF0000
heap
page read and write
7FF71863D000
unkown
page read and write
D30000
heap
page read and write
2442000
trusted library allocation
page read and write
160A000
heap
page read and write
160C000
heap
page read and write
DCB000
heap
page read and write
DCB000
heap
page read and write
C35000
heap
page read and write
C15000
heap
page read and write
DFC000
heap
page read and write
964000
heap
page read and write
A9E000
heap
page read and write
1623000
heap
page read and write
666F2000
unkown
page read and write
1D122000
heap
page read and write
953000
heap
page read and write
23F2000
trusted library allocation
page read and write
C49000
heap
page read and write
DE3000
heap
page read and write
15FD000
heap
page read and write
DD0000
heap
page read and write
15CE000
heap
page read and write
953000
heap
page read and write
1AED000
heap
page read and write
D93000
heap
page read and write
DBC000
heap
page read and write
C35000
heap
page read and write
DD0000
heap
page read and write
D39000
heap
page read and write
2442000
trusted library allocation
page read and write
92C000
heap
page read and write
D4F000
heap
page read and write
DFC000
heap
page read and write
1AD2000
heap
page read and write
DAC000
heap
page read and write
E01000
heap
page read and write
DF4000
heap
page read and write
DAC000
heap
page read and write
940000
heap
page read and write
95D000
heap
page read and write
1624000
heap
page read and write
7FF718610000
unkown
page readonly
D7F000
heap
page read and write
D5F000
heap
page read and write
1B2B000
heap
page read and write
B49000
heap
page read and write
DF4000
heap
page read and write
1AE1000
heap
page read and write
D32000
heap
page read and write
964000
heap
page read and write
C2D000
heap
page read and write
137B000
heap
page read and write
1AF5000
heap
page read and write
1AFD4000
heap
page read and write
2442000
trusted library allocation
page read and write
964000
heap
page read and write
1606000
heap
page read and write
979000
heap
page read and write
DEB000
heap
page read and write
C33000
heap
page read and write
D98000
heap
page read and write
C35000
heap
page read and write
DF0000
heap
page read and write
DD0000
heap
page read and write
9A9000
heap
page read and write
D6F000
heap
page read and write
FF8000
heap
page read and write
938000
heap
page read and write
DAC000
heap
page read and write
1606000
heap
page read and write
E01000
heap
page read and write
790000
heap
page read and write
9A9000
heap
page read and write
2A0D000
heap
page read and write
D31000
heap
page read and write
275C000
heap
page read and write
1B38000
heap
page read and write
4B5E000
heap
page read and write
14CE000
heap
page read and write
928000
heap
page read and write
D73000
heap
page read and write
276E000
heap
page read and write
1B06000
heap
page read and write
DF0000
heap
page read and write
C2D000
heap
page read and write
C28000
heap
page read and write
B49000
heap
page read and write
20B3000
trusted library allocation
page read and write
D50000
heap
page read and write
2442000
trusted library allocation
page read and write
947000
heap
page read and write
DE0000
heap
page read and write
160C000
heap
page read and write
B38000
heap
page read and write
D91000
heap
page read and write
DE3000
heap
page read and write
B58000
heap
page read and write
7FF718641000
unkown
page readonly
1CFE6000
heap
page read and write
B58000
heap
page read and write
242A000
trusted library allocation
page read and write
1AF1000
heap
page read and write
D4F000
heap
page read and write
1B06000
heap
page read and write
1AF5000
heap
page read and write
B7D000
heap
page read and write
964000
heap
page read and write
1B165000
heap
page read and write
29DC000
heap
page read and write
15FD000
heap
page read and write
DFC000
heap
page read and write
15ED000
heap
page read and write
DF4000
heap
page read and write
23C2000
trusted library allocation
page read and write
2442000
trusted library allocation
page read and write
C28000
heap
page read and write
C2D000
heap
page read and write
D7C000
heap
page read and write
D8B000
heap
page read and write
1D122000
heap
page read and write
1A6B8000
heap
page read and write
937000
heap
page read and write
160C000
heap
page read and write
DFC000
heap
page read and write
DFC000
heap
page read and write
928000
heap
page read and write
928000
heap
page read and write
1D142000
heap
page read and write
DFC000
heap
page read and write
92C000
heap
page read and write
D93000
heap
page read and write
7FF71863F000
unkown
page readonly
1AF3D000
heap
page read and write
C95000
heap
page read and write
5BDC000
heap
page read and write
B84000
heap
page read and write
1606000
heap
page read and write
D98000
heap
page read and write
DF0000
heap
page read and write
C28000
heap
page read and write
35C000
stack
page read and write
1AFD000
heap
page read and write
1AFD4000
heap
page read and write
1B1C000
heap
page read and write
1AE8F000
heap
page read and write
1B065000
heap
page read and write
DCB000
heap
page read and write
12C5000
heap
page read and write
4852000
heap
page read and write
1B06000
heap
page read and write
DCF000
heap
page read and write
C28000
heap
page read and write
1A59E000
heap
page read and write
DCF000
heap
page read and write
DF0000
heap
page read and write
D7F000
heap
page read and write
1B14000
heap
page read and write
E01000
heap
page read and write
957000
heap
page read and write
D7C000
heap
page read and write
5B74000
heap
page read and write
B5C000
heap
page read and write
C03000
heap
page read and write
E01000
heap
page read and write
1ADB9000
heap
page read and write
DAC000
heap
page read and write
DD0000
heap
page read and write
E01000
heap
page read and write
15C9000
heap
page read and write
15B4000
heap
page read and write
15FD000
heap
page read and write
1AE1000
heap
page read and write
DF0000
heap
page read and write
1B58000
heap
page read and write
B74000
heap
page read and write
953000
heap
page read and write
B74000
heap
page read and write
C1E000
heap
page read and write
D6B000
heap
page read and write
1AED000
heap
page read and write
1606000
heap
page read and write
C0A000
heap
page read and write
C16000
heap
page read and write
1AE1000
heap
page read and write
5BB3000
heap
page read and write
D73000
heap
page read and write
D98000
heap
page read and write
B5E000
heap
page read and write
DF4000
heap
page read and write
DD0000
heap
page read and write
23DA000
trusted library allocation
page read and write
1AF1000
heap
page read and write
D57000
heap
page read and write
7FF718632000
unkown
page readonly
B62000
heap
page read and write
C28000
heap
page read and write
D2C000
heap
page read and write
1AB8000
heap
page read and write
941000
heap
page read and write
1B22000
heap
page read and write
C49000
heap
page read and write
DF0000
heap
page read and write
B6C000
heap
page read and write
2442000
trusted library allocation
page read and write
23D3000
trusted library allocation
page read and write
938000
heap
page read and write
92C000
heap
page read and write
B74000
heap
page read and write
C49000
heap
page read and write
B74000
heap
page read and write
23D3000
trusted library allocation
page read and write
DE6000
heap
page read and write
DE0000
heap
page read and write
DAC000
heap
page read and write
B7E000
heap
page read and write
947000
heap
page read and write
2A0B000
heap
page read and write
5C4D000
heap
page read and write
DCB000
heap
page read and write
1AF3C000
heap
page read and write
DF4000
heap
page read and write
C1E000
heap
page read and write
DBC000
heap
page read and write
E01000
heap
page read and write
242A000
trusted library allocation
page read and write
1B22000
heap
page read and write
2793000
heap
page read and write
1AE1000
heap
page read and write
E01000
heap
page read and write
1AF1000
heap
page read and write
1AFD000
heap
page read and write
940000
heap
page read and write
D5F000
heap
page read and write
1AD36000
heap
page read and write
1AFD000
heap
page read and write
D98000
heap
page read and write
1B1C000
heap
page read and write
16E5000
heap
page read and write
DF0000
heap
page read and write
B7E000
heap
page read and write
160C000
heap
page read and write
1606000
heap
page read and write
162F000
heap
page read and write
C4D000
heap
page read and write
B5B000
heap
page read and write
D93000
heap
page read and write
2423000
trusted library allocation
page read and write
1B39000
heap
page read and write
242A000
trusted library allocation
page read and write
242A000
trusted library allocation
page read and write
160C000
heap
page read and write
B68000
heap
page read and write
D98000
heap
page read and write
1AD2000
heap
page read and write
1606000
heap
page read and write
DE0000
heap
page read and write
DE3000
heap
page read and write
B44000
heap
page read and write
279D000
heap
page read and write
B7C000
heap
page read and write
938000
heap
page read and write
B74000
heap
page read and write
C28000
heap
page read and write
964000
heap
page read and write
1ACE5000
heap
page read and write
B65000
heap
page read and write
DE3000
heap
page read and write
C28000
heap
page read and write
1B20000
heap
page read and write
1AE60000
heap
page read and write
18A09000
heap
page read and write
41D000
unkown
page readonly
C49000
heap
page read and write
964000
heap
page read and write
1AFA4000
heap
page read and write
E01000
heap
page read and write
1AE1000
heap
page read and write
928000
heap
page read and write
29E1000
heap
page read and write
1AEF7000
heap
page read and write
1D055000
heap
page read and write
7FF71863F000
unkown
page readonly
15B4000
heap
page read and write
E01000
heap
page read and write
B58000
heap
page read and write
C28000
heap
page read and write
1B58000
heap
page read and write
1B06000
heap
page read and write
DAC000
heap
page read and write
C28000
heap
page read and write
D77000
heap
page read and write
1B14000
heap
page read and write
2442000
trusted library allocation
page read and write
C35000
heap
page read and write
1B2B000
heap
page read and write
275C000
heap
page read and write
D70000
heap
page read and write
953000
heap
page read and write
1B06000
heap
page read and write
C35000
heap
page read and write
4CC5000
heap
page read and write
D77000
heap
page read and write
DBC000
heap
page read and write
2790000
heap
page read and write
C10000
heap
page read and write
E01000
heap
page read and write
9A9000
heap
page read and write
DE5000
heap
page read and write
B7C000
heap
page read and write
123E000
heap
page read and write
15B4000
heap
page read and write
1263000
heap
page read and write
15E5000
heap
page read and write
7FF718632000
unkown
page readonly
1ACC5000
heap
page read and write
BF3000
heap
page read and write
DCB000
heap
page read and write
D77000
heap
page read and write
DF4000
heap
page read and write
1438000
heap
page read and write
1B38000
heap
page read and write
1B48000
heap
page read and write
DE0000
heap
page read and write
957000
heap
page read and write
94C000
heap
page read and write
953000
heap
page read and write
E01000
heap
page read and write
2782000
heap
page read and write
D68000
heap
page read and write
E01000
heap
page read and write
274C000
heap
page read and write
242A000
trusted library allocation
page read and write
1B14000
heap
page read and write
DE0000
heap
page read and write
C35000
heap
page read and write
C15000
heap
page read and write
93D000
heap
page read and write
B5E000
heap
page read and write
96A000
heap
page read and write
9A9000
heap
page read and write
DAC000
heap
page read and write
C3A000
heap
page read and write
DE3000
heap
page read and write
DE3000
heap
page read and write
B7E000
heap
page read and write
1B12D000
heap
page read and write
1606000
heap
page read and write
D83000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
7FF718611000
unkown
page execute read
3A0000
heap
page read and write
1ACEA000
heap
page read and write
1A4A2000
heap
page read and write
1B14000
heap
page read and write
DF4000
heap
page read and write
1502000
heap
page read and write
E01000
heap
page read and write
DE3000
heap
page read and write
23D3000
trusted library allocation
page read and write
2793000
heap
page read and write
DF0000
heap
page read and write
1B0E7000
heap
page read and write
14E2000
heap
page read and write
11E7000
heap
page read and write
1B2B000
heap
page read and write
DBC000
heap
page read and write
DBC000
heap
page read and write
C49000
heap
page read and write
D73000
heap
page read and write
279F000
heap
page read and write
937000
heap
page read and write
7FF718632000
unkown
page readonly
DE0000
heap
page read and write
15E1000
heap
page read and write
1AD2000
heap
page read and write
93E000
heap
page read and write
1242000
heap
page read and write
94C000
heap
page read and write
1AD2000
heap
page read and write
DF0000
heap
page read and write
9A9000
heap
page read and write
B86000
heap
page read and write
B7E000
heap
page read and write
1AE31000
heap
page read and write
94C000
heap
page read and write
141D000
heap
page read and write
1438000
heap
page read and write
DF4000
heap
page read and write
DBC000
heap
page read and write
B74000
heap
page read and write
DF0000
heap
page read and write
DCB000
heap
page read and write
2423000
trusted library allocation
page read and write
1B14000
heap
page read and write
D73000
heap
page read and write
242A000
trusted library allocation
page read and write
1272000
heap
page read and write
1AC9C000
heap
page read and write
D91000
heap
page read and write
B74000
heap
page read and write
186F000
heap
page read and write
23D3000
trusted library allocation
page read and write
5BDC000
heap
page read and write
666F7000
unkown
page read and write
1AD1000
heap
page read and write
D98000
heap
page read and write
4C81000
heap
page read and write
1AE1000
heap
page read and write
1699000
heap
page read and write
D60000
heap
page read and write
4C7D000
heap
page read and write
7FF718632000
unkown
page readonly
1981000
heap
page read and write
1B165000
heap
page read and write
B7E000
heap
page read and write
12EB000
heap
page read and write
B49000
heap
page read and write
985000
heap
page read and write
C49000
heap
page read and write
D30000
heap
page read and write
93C000
heap
page read and write
2793000
heap
page read and write
D39000
heap
page read and write
275F000
heap
page read and write
B74000
heap
page read and write
242A000
trusted library allocation
page read and write
1AFD000
heap
page read and write
1B14000
heap
page read and write
D43000
heap
page read and write
279D000
heap
page read and write
C12000
heap
page read and write
D2D000
heap
page read and write
B74000
heap
page read and write
1AE1000
heap
page read and write
66640000
unkown
page readonly
1B06000
heap
page read and write
1AD12000
heap
page read and write
1AFAB000
heap
page read and write
DF0000
heap
page read and write
23D3000
trusted library allocation
page read and write
1AFD000
heap
page read and write
2797000
heap
page read and write
1B250000
heap
page read and write
D30000
heap
page read and write
94C000
heap
page read and write
5B66000
heap
page read and write
242A000
trusted library allocation
page read and write
DBC000
heap
page read and write
D45000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
1AF8D000
heap
page read and write
D68000
heap
page read and write
D73000
heap
page read and write
DE0000
heap
page read and write
1D20F000
heap
page read and write
157C000
heap
page read and write
1AFD000
heap
page read and write
1AD2000
heap
page read and write
B58000
heap
page read and write
D67000
heap
page read and write
DF4000
heap
page read and write
6856000
heap
page read and write
DE6000
heap
page read and write
C49000
heap
page read and write
279A000
heap
page read and write
1AFD000
heap
page read and write
29DD000
heap
page read and write
1B165000
heap
page read and write
B68000
heap
page read and write
275C000
heap
page read and write
4C62000
heap
page read and write
15D5000
heap
page read and write
1B1F000
heap
page read and write
93B000
heap
page read and write
23D3000
trusted library allocation
page read and write
23F2000
trusted library allocation
page read and write
B86000
heap
page read and write
2798000
heap
page read and write
D70000
heap
page read and write
DBC000
heap
page read and write
1AC3000
heap
page read and write
242A000
trusted library allocation
page read and write
2782000
heap
page read and write
1B14000
heap
page read and write
FF0000
heap
page read and write
B74000
heap
page read and write
DBC000
heap
page read and write
E01000
heap
page read and write
1AF5000
heap
page read and write
D30000
heap
page read and write
23D3000
trusted library allocation
page read and write
997000
heap
page read and write
66702000
unkown
page execute
1D101000
heap
page read and write
1AFD000
heap
page read and write
279F000
heap
page read and write
DE0000
heap
page read and write
DEB000
heap
page read and write
666F2000
unkown
page read and write
1AD6000
heap
page read and write
B68000
heap
page read and write
196D000
heap
page read and write
15D4000
heap
page read and write
B84000
heap
page read and write
2423000
trusted library allocation
page read and write
279F000
heap
page read and write
C02000
heap
page read and write
13DC000
heap
page read and write
1D1EF000
heap
page read and write
1AF48000
heap
page read and write
1B065000
heap
page read and write
B86000
heap
page read and write
D6B000
heap
page read and write
C12000
heap
page read and write
AEC000
heap
page read and write
172C000
heap
page read and write
14E2000
heap
page read and write
1606000
heap
page read and write
93B000
heap
page read and write
15FD000
heap
page read and write
C1E000
heap
page read and write
D11000
heap
page read and write
16E0000
heap
page read and write
D83000
heap
page read and write
66706000
unkown
page readonly
242A000
trusted library allocation
page read and write
C02000
heap
page read and write
D7F000
heap
page read and write
9C5000
heap
page read and write
D91000
heap
page read and write
278A000
heap
page read and write
C28000
heap
page read and write
DD0000
heap
page read and write
D30000
heap
page read and write
2442000
trusted library allocation
page read and write
974000
heap
page read and write
15D3000
heap
page read and write
1ACBC000
heap
page read and write
23F2000
trusted library allocation
page read and write
1AB8000
heap
page read and write
1AF5000
heap
page read and write
23D3000
trusted library allocation
page read and write
2442000
trusted library allocation
page read and write
DE3000
heap
page read and write
DCB000
heap
page read and write
928000
heap
page read and write
C2D000
heap
page read and write
B84000
heap
page read and write
DF4000
heap
page read and write
B68000
heap
page read and write
D43000
heap
page read and write
B58000
heap
page read and write
1AF38000
heap
page read and write
964000
heap
page read and write
2423000
trusted library allocation
page read and write
194F000
heap
page read and write
C28000
heap
page read and write
E8D000
heap
page read and write
928000
heap
page read and write
950000
heap
page read and write
DD0000
heap
page read and write
14CE000
heap
page read and write
DF0000
heap
page read and write
1B2B000
heap
page read and write
DE5000
heap
page read and write
D98000
heap
page read and write
1AD7000
heap
page read and write
B74000
heap
page read and write
DF4000
heap
page read and write
E01000
heap
page read and write
1377000
heap
page read and write
274C000
heap
page read and write
DAC000
heap
page read and write
610000
heap
page read and write
19C3000
heap
page read and write
DEB000
heap
page read and write
1AD2000
heap
page read and write
D98000
heap
page read and write
C49000
heap
page read and write
1B14000
heap
page read and write
15EE000
heap
page read and write
1A6C7000
heap
page read and write
279F000
heap
page read and write
D27000
heap
page read and write
2423000
trusted library allocation
page read and write
1B2B000
heap
page read and write
2797000
heap
page read and write
DFC000
heap
page read and write
7FF718641000
unkown
page readonly
1AEAE000
heap
page read and write
7FF71863F000
unkown
page readonly
C28000
heap
page read and write
C28000
heap
page read and write
9A9000
heap
page read and write
15DE000
heap
page read and write
1AE5000
heap
page read and write
1AF1000
heap
page read and write
C33000
heap
page read and write
23D3000
trusted library allocation
page read and write
7FF718640000
unkown
page read and write
964000
heap
page read and write
B58000
heap
page read and write
B7E000
heap
page read and write
B74000
heap
page read and write
141D000
heap
page read and write
7FF718641000
unkown
page readonly
275F000
heap
page read and write
2794000
heap
page read and write
7FF718641000
unkown
page readonly
DE6000
heap
page read and write
DCF000
heap
page read and write
E01000
heap
page read and write
D98000
heap
page read and write
1B1C000
heap
page read and write
DE6000
heap
page read and write
928000
heap
page read and write
DE0000
heap
page read and write
B49000
heap
page read and write
947000
heap
page read and write
15FD000
heap
page read and write
66641000
unkown
page execute read
1B14000
heap
page read and write
1B2B000
heap
page read and write
15FD000
heap
page read and write
1B14000
heap
page read and write
1D1EF000
heap
page read and write
1900000
heap
page read and write
BEF000
stack
page read and write
D91000
heap
page read and write
1B2B000
heap
page read and write
93B000
heap
page read and write
C2D000
heap
page read and write
DFC000
heap
page read and write
1B14000
heap
page read and write
D5F000
heap
page read and write
E01000
heap
page read and write
B68000
heap
page read and write
C35000
heap
page read and write
DE3000
heap
page read and write
620000
heap
page read and write
1357000
heap
page read and write
1B48000
heap
page read and write
458000
unkown
page write copy
DF4000
heap
page read and write
1ABB000
heap
page read and write
964000
heap
page read and write
D60000
heap
page read and write
DCF000
heap
page read and write
95D000
heap
page read and write
B5B000
heap
page read and write
DE3000
heap
page read and write
1AA4000
heap
page read and write
947000
heap
page read and write
160C000
heap
page read and write
160C000
heap
page read and write
1AF1000
heap
page read and write
1ABC000
heap
page read and write
DF4000
heap
page read and write
DCB000
heap
page read and write
7FF718641000
unkown
page readonly
DAC000
heap
page read and write
DCB000
heap
page read and write
B5E000
heap
page read and write
C12000
heap
page read and write
1AE3F000
heap
page read and write
D7F000
heap
page read and write
7FF718641000
unkown
page readonly
1AFE2000
heap
page read and write
77C000
stack
page read and write
C2D000
heap
page read and write
DE0000
heap
page read and write
DD0000
heap
page read and write
D68000
heap
page read and write
DBC000
heap
page read and write
DCB000
heap
page read and write
B7E000
heap
page read and write
DBC000
heap
page read and write
1AF1000
heap
page read and write
148D000
heap
page read and write
B7E000
heap
page read and write
1AE1000
heap
page read and write
DE3000
heap
page read and write
928000
heap
page read and write
1D06E000
heap
page read and write
7FF718641000
unkown
page readonly
8D0000
heap
page read and write
C28000
heap
page read and write
1B11E000
heap
page read and write
D5F000
heap
page read and write
1D076000
heap
page read and write
20A2000
trusted library allocation
page read and write
D91000
heap
page read and write
B86000
heap
page read and write
DFC000
heap
page read and write
DCB000
heap
page read and write
1AFD000
heap
page read and write
7FF718632000
unkown
page readonly
DF0000
heap
page read and write
C28000
heap
page read and write
D7B000
heap
page read and write
1AD2000
heap
page read and write
95D000
heap
page read and write
66640000
unkown
page readonly
E01000
heap
page read and write
DE3000
heap
page read and write
DCB000
heap
page read and write
1AEAE000
heap
page read and write
DE3000
heap
page read and write
E01000
heap
page read and write
4A0000
heap
page read and write
15F1000
heap
page read and write
1AE1000
heap
page read and write
C49000
heap
page read and write
DCB000
heap
page read and write
DBC000
heap
page read and write
94C000
heap
page read and write
D7F000
heap
page read and write
DE3000
heap
page read and write
242A000
trusted library allocation
page read and write
242A000
trusted library allocation
page read and write
7FF718610000
unkown
page readonly
1A676000
heap
page read and write
29DC000
heap
page read and write
1B0FE000
heap
page read and write
1AF4F000
heap
page read and write
278A000
heap
page read and write
1A4DE000
heap
page read and write
179E000
heap
page read and write
C53000
heap
page read and write
DD0000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
B86000
heap
page read and write
1199000
heap
page read and write
953000
heap
page read and write
1B06000
heap
page read and write
D73000
heap
page read and write
D73000
heap
page read and write
DF4000
heap
page read and write
2442000
trusted library allocation
page read and write
E01000
heap
page read and write
2A01000
heap
page read and write
DCB000
heap
page read and write
94C000
heap
page read and write
15C2000
heap
page read and write
C49000
heap
page read and write
617000
heap
page read and write
DF0000
heap
page read and write
950000
heap
page read and write
D83000
heap
page read and write
DE3000
heap
page read and write
1B14000
heap
page read and write
D98000
heap
page read and write
C28000
heap
page read and write
D5F000
heap
page read and write
DFC000
heap
page read and write
9C5000
heap
page read and write
DE0000
heap
page read and write
1AE1000
heap
page read and write
1502000
heap
page read and write
DE6000
heap
page read and write
2793000
heap
page read and write
D30000
heap
page read and write
2423000
trusted library allocation
page read and write
23F2000
trusted library allocation
page read and write
C49000
heap
page read and write
D4F000
heap
page read and write
947000
heap
page read and write
D83000
heap
page read and write
DCF000
heap
page read and write
820000
heap
page read and write
26B4000
heap
page read and write
C35000
heap
page read and write
26C4000
heap
page read and write
1AD2000
heap
page read and write
953000
heap
page read and write
95D000
heap
page read and write
1B22000
heap
page read and write
23F2000
trusted library allocation
page read and write
DAC000
heap
page read and write
C1E000
heap
page read and write
DAC000
heap
page read and write
DD0000
heap
page read and write
DBC000
heap
page read and write
2442000
trusted library allocation
page read and write
C2D000
heap
page read and write
29E1000
heap
page read and write
132D000
heap
page read and write
DFC000
heap
page read and write
D6D000
heap
page read and write
DE0000
heap
page read and write
D7C000
heap
page read and write
B68000
heap
page read and write
937000
heap
page read and write
278A000
heap
page read and write
DCF000
heap
page read and write
1606000
heap
page read and write
DD0000
heap
page read and write
1AF75000
heap
page read and write
979000
heap
page read and write
1AB8000
heap
page read and write
1623000
heap
page read and write
E01000
heap
page read and write
1AD09000
heap
page read and write
9A9000
heap
page read and write
7FF718632000
unkown
page readonly
C1E000
heap
page read and write
7FF718641000
unkown
page readonly
7FF718640000
unkown
page write copy
DFC000
heap
page read and write
1A685000
heap
page read and write
B7E000
heap
page read and write
968000
heap
page read and write
D7C000
heap
page read and write
D31000
heap
page read and write
C35000
heap
page read and write
E01000
heap
page read and write
1B14000
heap
page read and write
C2E000
heap
page read and write
2423000
trusted library allocation
page read and write
2442000
trusted library allocation
page read and write
D7C000
heap
page read and write
9A9000
heap
page read and write
DE5000
heap
page read and write
DD0000
heap
page read and write
1A329000
heap
page read and write
D30000
heap
page read and write
DE0000
heap
page read and write
947000
heap
page read and write
12E0000
heap
page read and write
1B165000
heap
page read and write
DD0000
heap
page read and write
242A000
trusted library allocation
page read and write
1919000
heap
page read and write
2442000
trusted library allocation
page read and write
B86000
heap
page read and write
1AED000
heap
page read and write
666D1000
unkown
page readonly
1B14000
heap
page read and write
5081000
heap
page read and write
D98000
heap
page read and write
E81000
heap
page read and write
1AE1000
heap
page read and write
1D1DB000
heap
page read and write
B7E000
heap
page read and write
91E000
heap
page read and write
11A5000
heap
page read and write
D93000
heap
page read and write
1AF9000
heap
page read and write
DFC000
heap
page read and write
D98000
heap
page read and write
C49000
heap
page read and write
93F000
heap
page read and write
B68000
heap
page read and write
279F000
heap
page read and write
DE6000
heap
page read and write
DAD000
heap
page read and write
1B18000
heap
page read and write
1ADC8000
heap
page read and write
29E1000
heap
page read and write
1AC9000
heap
page read and write
1D1DB000
heap
page read and write
B5B000
heap
page read and write
1AEF7000
heap
page read and write
C16000
heap
page read and write
C03000
heap
page read and write
C28000
heap
page read and write
D4F000
heap
page read and write
E01000
heap
page read and write
DF4000
heap
page read and write
2790000
heap
page read and write
3712000
heap
page read and write
D77000
heap
page read and write
DBC000
heap
page read and write
DCF000
heap
page read and write
C28000
heap
page read and write
DE6000
heap
page read and write
B86000
heap
page read and write
C0C000
heap
page read and write
DAC000
heap
page read and write
1AF03000
heap
page read and write
2442000
trusted library allocation
page read and write
1ADA9000
heap
page read and write
14DE000
heap
page read and write
279F000
heap
page read and write
277E000
heap
page read and write
1AD2000
heap
page read and write
1AED000
heap
page read and write
1B2B000
heap
page read and write
C15000
heap
page read and write
D30000
heap
page read and write
1A655000
heap
page read and write
DAC000
heap
page read and write
DCB000
heap
page read and write
1B11E000
heap
page read and write
DE5000
heap
page read and write
D73000
heap
page read and write
E01000
heap
page read and write
DE0000
heap
page read and write
279F000
heap
page read and write
DFC000
heap
page read and write
DE5000
heap
page read and write
950000
heap
page read and write
D7C000
heap
page read and write
1B007000
heap
page read and write
D50000
heap
page read and write
15EE000
heap
page read and write
DFC000
heap
page read and write
12E5000
heap
page read and write
DCF000
heap
page read and write
DF0000
heap
page read and write
1AF71000
heap
page read and write
123B000
heap
page read and write
29E1000
heap
page read and write
277E000
heap
page read and write
666F2000
unkown
page read and write
1377000
heap
page read and write
94B000
heap
page read and write
B78000
heap
page read and write
7FF71863D000
unkown
page write copy
1B06000
heap
page read and write
1B06000
heap
page read and write
DF4000
heap
page read and write
B7E000
heap
page read and write
D98000
heap
page read and write
23F2000
trusted library allocation
page read and write
D73000
heap
page read and write
DBC000
heap
page read and write
C2D000
heap
page read and write
B5D000
heap
page read and write
B5D000
heap
page read and write
B49000
heap
page read and write
C49000
heap
page read and write
D83000
heap
page read and write
D7F000
heap
page read and write
1AF17000
heap
page read and write
137B000
heap
page read and write
DF4000
heap
page read and write
C49000
heap
page read and write
DD0000
heap
page read and write
1AE1000
heap
page read and write
1AEC4000
heap
page read and write
E01000
heap
page read and write
9A9000
heap
page read and write
DAC000
heap
page read and write
1AC3000
heap
page read and write
B58000
heap
page read and write
964000
heap
page read and write
276E000
heap
page read and write
D83000
heap
page read and write
1AF5000
heap
page read and write
E01000
heap
page read and write
D77000
heap
page read and write
D98000
heap
page read and write
938000
heap
page read and write
15D1000
heap
page read and write
953000
heap
page read and write
2423000
trusted library allocation
page read and write
DE3000
heap
page read and write
928000
heap
page read and write
1AE40000
heap
page read and write
1B14000
heap
page read and write
DCB000
heap
page read and write
29E1000
heap
page read and write
D83000
heap
page read and write
953000
heap
page read and write
DBC000
heap
page read and write
DE5000
heap
page read and write
928000
heap
page read and write
DBC000
heap
page read and write
DE3000
heap
page read and write
9A9000
heap
page read and write
E01000
heap
page read and write
BF3000
heap
page read and write
C35000
heap
page read and write
212E000
heap
page read and write
B7D000
heap
page read and write
1AD6000
heap
page read and write
D39000
heap
page read and write
1AED000
heap
page read and write
DE0000
heap
page read and write
1AD12000
heap
page read and write
957000
heap
page read and write
D91000
heap
page read and write
DE0000
heap
page read and write
B5D000
heap
page read and write
DD0000
heap
page read and write
94C000
heap
page read and write
DBC000
heap
page read and write
1CF41000
heap
page read and write
93C000
heap
page read and write
DD0000
heap
page read and write
DE6000
heap
page read and write
DFC000
heap
page read and write
DBC000
heap
page read and write
2A0F000
heap
page read and write
29DD000
heap
page read and write
DE1000
heap
page read and write
C12000
heap
page read and write
D68000
heap
page read and write
D98000
heap
page read and write
1235000
heap
page read and write
15BA000
heap
page read and write
14D0000
heap
page read and write
1ABF000
heap
page read and write
93C000
heap
page read and write
9A9000
heap
page read and write
C03000
heap
page read and write
B58000
heap
page read and write
5F5000
heap
page read and write
DD0000
heap
page read and write
D30000
heap
page read and write
D3B000
heap
page read and write
190000
heap
page read and write
1ABC000
heap
page read and write
D91000
heap
page read and write
953000
heap
page read and write
242A000
trusted library allocation
page read and write
D2D000
heap
page read and write
C35000
heap
page read and write
2979000
heap
page read and write
2442000
trusted library allocation
page read and write
D83000
heap
page read and write
911000
heap
page read and write
1235000
heap
page read and write
C32000
heap
page read and write
937000
heap
page read and write
1AE69000
heap
page read and write
E01000
heap
page read and write
7FF718641000
unkown
page readonly
D30000
heap
page read and write
1AD4000
heap
page read and write
964000
heap
page read and write
B84000
heap
page read and write
E01000
heap
page read and write
C28000
heap
page read and write
D7F000
heap
page read and write
B86000
heap
page read and write
1AF1000
heap
page read and write
D57000
heap
page read and write
D4F000
heap
page read and write
947000
heap
page read and write
DE6000
heap
page read and write
2782000
heap
page read and write
964000
heap
page read and write
891000
heap
page read and write
141C000
heap
page read and write
1612000
heap
page read and write
DE3000
heap
page read and write
DF0000
heap
page read and write
29DD000
heap
page read and write
DAC000
heap
page read and write
2450000
heap
page read and write
23F2000
trusted library allocation
page read and write
1282000
heap
page read and write
E01000
heap
page read and write
1AD2000
heap
page read and write
B63000
heap
page read and write
DE0000
heap
page read and write
1B125000
heap
page read and write
D73000
heap
page read and write
D84000
heap
page read and write
D60000
heap
page read and write
1623000
heap
page read and write
1A4CF000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
1B1C000
heap
page read and write
C35000
heap
page read and write
DF4000
heap
page read and write
1408000
heap
page read and write
DD0000
heap
page read and write
DD0000
heap
page read and write
1A646000
heap
page read and write
DCF000
heap
page read and write
1AF1000
heap
page read and write
E01000
heap
page read and write
1B18000
heap
page read and write
23F2000
trusted library allocation
page read and write
242A000
trusted library allocation
page read and write
12C5000
heap
page read and write
947000
heap
page read and write
D98000
heap
page read and write
D93000
heap
page read and write
1ADC8000
heap
page read and write
DF0000
heap
page read and write
DCB000
heap
page read and write
C53000
heap
page read and write
B86000
heap
page read and write
C03000
heap
page read and write
DF0000
heap
page read and write
C15000
heap
page read and write
1AE2000
heap
page read and write
B81000
heap
page read and write
1AD35000
heap
page read and write
B58000
heap
page read and write
162F000
heap
page read and write
14AE000
heap
page read and write
1606000
heap
page read and write
B86000
heap
page read and write
DFC000
heap
page read and write
DAC000
heap
page read and write
26D4000
heap
page read and write
D68000
heap
page read and write
1AD4000
heap
page read and write
15AC000
heap
page read and write
D30000
heap
page read and write
BF2000
heap
page read and write
278A000
heap
page read and write
D72000
heap
page read and write
29E1000
heap
page read and write
DD0000
heap
page read and write
666F2000
unkown
page read and write
277E000
heap
page read and write
DCF000
heap
page read and write
C1E000
heap
page read and write
275C000
heap
page read and write
93D000
heap
page read and write
23D3000
trusted library allocation
page read and write
94C000
heap
page read and write
15C5000
heap
page read and write
DF0000
heap
page read and write
E01000
heap
page read and write
B68000
heap
page read and write
1AD2000
heap
page read and write
B68000
heap
page read and write
D68000
heap
page read and write
DCF000
heap
page read and write
1B25000
heap
page read and write
D2D000
heap
page read and write
1B20000
heap
page read and write
C35000
heap
page read and write
B84000
heap
page read and write
5B90000
heap
page read and write
66641000
unkown
page execute read
94C000
heap
page read and write
D5F000
heap
page read and write
1AD8000
heap
page read and write
DAC000
heap
page read and write
DE6000
heap
page read and write
D77000
heap
page read and write
E01000
heap
page read and write
928000
heap
page read and write
1AF5000
heap
page read and write
DF4000
heap
page read and write
D77000
heap
page read and write
1B06000
heap
page read and write
1A3D0000
heap
page read and write
DBC000
heap
page read and write
E01000
heap
page read and write
1B1F000
heap
page read and write
1AE73000
heap
page read and write
C12000
heap
page read and write
C28000
heap
page read and write
B68000
heap
page read and write
B6C000
heap
page read and write
92C000
heap
page read and write
1B39000
heap
page read and write
1B06000
heap
page read and write
937000
heap
page read and write
B68000
heap
page read and write
1ACC4000
heap
page read and write
937000
heap
page read and write
15E3000
heap
page read and write
2790000
heap
page read and write
D93000
heap
page read and write
9A9000
heap
page read and write
DF0000
heap
page read and write
C32000
heap
page read and write
2790000
heap
page read and write
23F2000
trusted library allocation
page read and write
DE0000
heap
page read and write
94C000
heap
page read and write
2442000
trusted library allocation
page read and write
E01000
heap
page read and write
1AD61000
heap
page read and write
1AE1000
heap
page read and write
DCF000
heap
page read and write
1B181000
heap
page read and write
7FF718640000
unkown
page write copy
DF4000
heap
page read and write
1B2B000
heap
page read and write
DE6000
heap
page read and write
D4F000
heap
page read and write
D7C000
heap
page read and write
1AFD000
heap
page read and write
1D20F000
heap
page read and write
C2D000
heap
page read and write
DD0000
heap
page read and write
95D000
heap
page read and write
1B06000
heap
page read and write
1606000
heap
page read and write
9C5000
heap
page read and write
1A4DE000
heap
page read and write
E01000
heap
page read and write
C12000
heap
page read and write
E01000
heap
page read and write
DAC000
heap
page read and write
DBC000
heap
page read and write
DAD000
heap
page read and write
C28000
heap
page read and write
88D000
heap
page read and write
B86000
heap
page read and write
15F2000
heap
page read and write
92C000
heap
page read and write
CF3000
heap
page read and write
DF4000
heap
page read and write
C11000
heap
page read and write
274C000
heap
page read and write
66706000
unkown
page readonly
C2D000
heap
page read and write
C2D000
heap
page read and write
1B39000
heap
page read and write
DE6000
heap
page read and write
1B14000
heap
page read and write
DAC000
heap
page read and write
E01000
heap
page read and write
DD0000
heap
page read and write
D68000
heap
page read and write
C2D000
heap
page read and write
DF4000
heap
page read and write
DFC000
heap
page read and write
D98000
heap
page read and write
160C000
heap
page read and write
D91000
heap
page read and write
23AA000
trusted library allocation
page read and write
12C5000
heap
page read and write
DE1000
heap
page read and write
94C000
heap
page read and write
947000
heap
page read and write
15E2000
heap
page read and write
C49000
heap
page read and write
1B06000
heap
page read and write
DE3000
heap
page read and write
DBC000
heap
page read and write
15ED000
heap
page read and write
D68000
heap
page read and write
D8B000
heap
page read and write
95D000
heap
page read and write
C1E000
heap
page read and write
1B1C000
heap
page read and write
DE5000
heap
page read and write
2FE3000
heap
page read and write
B59000
heap
page read and write
D4F000
heap
page read and write
15FD000
heap
page read and write
94C000
heap
page read and write
C51000
heap
page read and write
B59000
heap
page read and write
7FF71863D000
unkown
page read and write
DF0000
heap
page read and write
162F000
heap
page read and write
D36000
heap
page read and write
DBC000
heap
page read and write
E01000
heap
page read and write
666F4000
unkown
page write copy
DE6000
heap
page read and write
276E000
heap
page read and write
D98000
heap
page read and write
DE0000
heap
page read and write
D2D000
heap
page read and write
DCB000
heap
page read and write
D75000
heap
page read and write
DE6000
heap
page read and write
B86000
heap
page read and write
2793000
heap
page read and write
13CF000
stack
page read and write
94C000
heap
page read and write
B44000
heap
page read and write
7FF718640000
unkown
page read and write
950000
heap
page read and write
D91000
heap
page read and write
DF4000
heap
page read and write
D7B000
heap
page read and write
B6C000
heap
page read and write
DE6000
heap
page read and write
15C2000
heap
page read and write
E01000
heap
page read and write
1619000
heap
page read and write
92C000
heap
page read and write
B84000
heap
page read and write
DFC000
heap
page read and write
2768000
heap
page read and write
D6F000
heap
page read and write
1AF58000
heap
page read and write
950000
heap
page read and write
2778000
heap
page read and write
1B18000
heap
page read and write
DF4000
heap
page read and write
8EE000
heap
page read and write
E01000
heap
page read and write
D70000
heap
page read and write
14D000
stack
page read and write
DFC000
heap
page read and write
D7C000
heap
page read and write
DE0000
heap
page read and write
D6B000
heap
page read and write
D5F000
heap
page read and write
1D1DB000
heap
page read and write
1B207000
heap
page read and write
992000
heap
page read and write
2423000
trusted library allocation
page read and write
E7D000
heap
page read and write
E01000
heap
page read and write
C02000
heap
page read and write
414000
unkown
page readonly
1AE1000
heap
page read and write
D77000
heap
page read and write
D30000
heap
page read and write
C49000
heap
page read and write
11A8000
heap
page read and write
28B0000
heap
page read and write
26FD000
heap
page read and write
B74000
heap
page read and write
D8B000
heap
page read and write
1D162000
heap
page read and write
D5F000
heap
page read and write
2442000
trusted library allocation
page read and write
1B06000
heap
page read and write
1B58000
heap
page read and write
DCB000
heap
page read and write
1AF48000
heap
page read and write
DC2000
heap
page read and write
1B1A000
heap
page read and write
1ABF000
heap
page read and write
2FEE000
heap
page read and write
B78000
heap
page read and write
D10000
heap
page read and write
C12000
heap
page read and write
DAC000
heap
page read and write
277E000
heap
page read and write
7FF718641000
unkown
page readonly
B7E000
heap
page read and write
15E8000
heap
page read and write
DFC000
heap
page read and write
DCF000
heap
page read and write
D91000
heap
page read and write
276E000
heap
page read and write
C35000
heap
page read and write
1B18000
heap
page read and write
1490000
heap
page read and write
1281000
heap
page read and write
937000
heap
page read and write
1B06000
heap
page read and write
DE0000
heap
page read and write
1AED000
heap
page read and write
D8B000
heap
page read and write
E01000
heap
page read and write
DF0000
heap
page read and write
C49000
heap
page read and write
414000
unkown
page readonly
DE0000
heap
page read and write
D68000
heap
page read and write
1A08000
heap
page read and write
242A000
trusted library allocation
page read and write
2768000
heap
page read and write
DF4000
heap
page read and write
1B228000
heap
page read and write
4B30000
heap
page read and write
DF4000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
D60000
heap
page read and write
DE0000
heap
page read and write
86B000
heap
page read and write
964000
heap
page read and write
B59000
heap
page read and write
E01000
heap
page read and write
23D3000
trusted library allocation
page read and write
C2D000
heap
page read and write
93B000
heap
page read and write
C28000
heap
page read and write
29E1000
heap
page read and write
242A000
trusted library allocation
page read and write
1D1DB000
heap
page read and write
DFC000
heap
page read and write
1AD4000
heap
page read and write
DE0000
heap
page read and write
1D1CD000
heap
page read and write
D91000
heap
page read and write
1B016000
heap
page read and write
1A48A000
heap
page read and write
195E000
heap
page read and write
B43000
heap
page read and write
1AF1000
heap
page read and write
15FD000
heap
page read and write
5B54000
heap
page read and write
1AE1000
heap
page read and write
C28000
heap
page read and write
B58000
heap
page read and write
23D3000
trusted library allocation
page read and write
1B2B000
heap
page read and write
DF0000
heap
page read and write
93B000
heap
page read and write
DCB000
heap
page read and write
B7E000
heap
page read and write
15F1000
heap
page read and write
666D1000
unkown
page readonly
149B000
heap
page read and write
B59000
heap
page read and write
D84000
heap
page read and write
DCF000
heap
page read and write
DBC000
heap
page read and write
D30000
heap
page read and write
12AD000
heap
page read and write
D98000
heap
page read and write
7FF71863D000
unkown
page write copy
1AFD4000
heap
page read and write
275C000
heap
page read and write
1ACBC000
heap
page read and write
C28000
heap
page read and write
2442000
trusted library allocation
page read and write
DE6000
heap
page read and write
1B58000
heap
page read and write
1D142000
heap
page read and write
D30000
heap
page read and write
1870000
heap
page read and write
277E000
heap
page read and write
160C000
heap
page read and write
D91000
heap
page read and write
1AC9000
heap
page read and write
1AED000
heap
page read and write
242A000
trusted library allocation
page read and write
E01000
heap
page read and write
B74000
heap
page read and write
2442000
trusted library allocation
page read and write
1D06E000
heap
page read and write
DD0000
heap
page read and write
C07000
heap
page read and write
D77000
heap
page read and write
1AE5000
heap
page read and write
1AA4000
heap
page read and write
DEB000
heap
page read and write
2798000
heap
page read and write
23D3000
trusted library allocation
page read and write
DCB000
heap
page read and write
7FF71863D000
unkown
page write copy
B74000
heap
page read and write
D98000
heap
page read and write
D98000
heap
page read and write
7FF71863D000
unkown
page write copy
DAC000
heap
page read and write
953000
heap
page read and write
D98000
heap
page read and write
989000
heap
page read and write
1B075000
heap
page read and write
275C000
heap
page read and write
1B2C000
heap
page read and write
242A000
trusted library allocation
page read and write
DE3000
heap
page read and write
D73000
heap
page read and write
66702000
unkown
page execute
7FF71863F000
unkown
page readonly
E01000
heap
page read and write
2442000
trusted library allocation
page read and write
B7D000
heap
page read and write
DFC000
heap
page read and write
C1D000
heap
page read and write
1B057000
heap
page read and write
B58000
heap
page read and write
96A000
heap
page read and write
C02000
heap
page read and write
1B04E000
heap
page read and write
DD0000
heap
page read and write
D5F000
heap
page read and write
1AFD000
heap
page read and write
953000
heap
page read and write
23D3000
trusted library allocation
page read and write
C2D000
heap
page read and write
95D000
heap
page read and write
DE6000
heap
page read and write
15E1000
heap
page read and write
DE6000
heap
page read and write
C02000
heap
page read and write
9A9000
heap
page read and write
DFC000
heap
page read and write
D30000
heap
page read and write
DF0000
heap
page read and write
4C8C000
heap
page read and write
BF3000
heap
page read and write
2442000
trusted library allocation
page read and write
2423000
trusted library allocation
page read and write
DE6000
heap
page read and write
DF4000
heap
page read and write
DE0000
heap
page read and write
D98000
heap
page read and write
D68000
heap
page read and write
1AF5000
heap
page read and write
950000
heap
page read and write
2423000
trusted library allocation
page read and write
DFC000
heap
page read and write
2442000
trusted library allocation
page read and write
B68000
heap
page read and write
242A000
trusted library allocation
page read and write
9A9000
heap
page read and write
DAD000
heap
page read and write
C49000
heap
page read and write
1AF5000
heap
page read and write
279F000
heap
page read and write
1AA4000
heap
page read and write
D98000
heap
page read and write
D98000
heap
page read and write
B30000
heap
page read and write
2666000
heap
page read and write
C2D000
heap
page read and write
138E000
heap
page read and write
DFC000
heap
page read and write
B5B000
heap
page read and write
7FF718640000
unkown
page read and write
1B14000
heap
page read and write
D25000
heap
page read and write
1606000
heap
page read and write
D83000
heap
page read and write
D60000
heap
page read and write
E01000
heap
page read and write
242A000
trusted library allocation
page read and write
DE0000
heap
page read and write
1B231000
heap
page read and write
D7F000
heap
page read and write
15E8000
heap
page read and write
275C000
heap
page read and write
DE5000
heap
page read and write
1B14000
heap
page read and write
2423000
trusted library allocation
page read and write
1A74000
heap
page read and write
1BBE000
heap
page read and write
DBC000
heap
page read and write
947000
heap
page read and write
1AE5000
heap
page read and write
1D085000
heap
page read and write
1AF0000
heap
page read and write
DF4000
heap
page read and write
DBC000
heap
page read and write
840000
heap
page read and write
C35000
heap
page read and write
C1D000
heap
page read and write
D5F000
heap
page read and write
DCB000
heap
page read and write
D2C000
heap
page read and write
D43000
heap
page read and write
D8B000
heap
page read and write
DE5000
heap
page read and write
D72000
heap
page read and write
C28000
heap
page read and write
B5B000
heap
page read and write
1D1CD000
heap
page read and write
DF4000
heap
page read and write
964000
heap
page read and write
2423000
trusted library allocation
page read and write
23D3000
trusted library allocation
page read and write
C41000
heap
page read and write
DE3000
heap
page read and write
1D06E000
heap
page read and write
DBC000
heap
page read and write
93D000
heap
page read and write
160C000
heap
page read and write
B7E000
heap
page read and write
94C000
heap
page read and write
C2D000
heap
page read and write
DE6000
heap
page read and write
E01000
heap
page read and write
1B06000
heap
page read and write
DFC000
heap
page read and write
DBC000
heap
page read and write
12DF000
heap
page read and write
1AD1000
heap
page read and write
D98000
heap
page read and write
DCF000
heap
page read and write
B5C000
heap
page read and write
2778000
heap
page read and write
D98000
heap
page read and write
B5E000
heap
page read and write
C0D000
heap
page read and write
B74000
heap
page read and write
9C5000
heap
page read and write
1AF1000
heap
page read and write
D7F000
heap
page read and write
1ADC8000
heap
page read and write
D24000
heap
page read and write
95D000
heap
page read and write
7D0000
heap
page read and write
1B06000
heap
page read and write
B3E000
heap
page read and write
1B48000
heap
page read and write
B7E000
heap
page read and write
1D076000
heap
page read and write
1D142000
heap
page read and write
940000
heap
page read and write
1AF5000
heap
page read and write
14D2000
heap
page read and write
2720000
heap
page read and write
1AFCC000
heap
page read and write
DF4000
heap
page read and write
15D3000
heap
page read and write
E01000
heap
page read and write
3725000
heap
page read and write
1AA4000
heap
page read and write
150C000
heap
page read and write
B7E000
heap
page read and write
D70000
heap
page read and write
DE5000
heap
page read and write
66702000
unkown
page execute
DCB000
heap
page read and write
D68000
heap
page read and write
C28000
heap
page read and write
9C5000
heap
page read and write
C28000
heap
page read and write
2423000
trusted library allocation
page read and write
B58000
heap
page read and write
1B2B000
heap
page read and write
CAE000
heap
page read and write
947000
heap
page read and write
E01000
heap
page read and write
DBC000
heap
page read and write
DE0000
heap
page read and write
1B06000
heap
page read and write
D98000
heap
page read and write
B6C000
heap
page read and write
C1E000
heap
page read and write
9C5000
heap
page read and write
DD0000
heap
page read and write
1ACD000
heap
page read and write
160A000
heap
page read and write
1B14000
heap
page read and write
DCB000
heap
page read and write
1B0D000
heap
page read and write
7FF718610000
unkown
page readonly
1B14000
heap
page read and write
666F4000
unkown
page write copy
928000
heap
page read and write
15D5000
heap
page read and write
19C000
stack
page read and write
B58000
heap
page read and write
19C9000
heap
page read and write
B86000
heap
page read and write
D98000
heap
page read and write
2760000
heap
page read and write
94C000
heap
page read and write
56C000
stack
page read and write
D84000
heap
page read and write
182E000
heap
page read and write
C03000
heap
page read and write
DE3000
heap
page read and write
1A31000
heap
page read and write
1AED000
heap
page read and write
1AD7000
heap
page read and write
DE0000
heap
page read and write
15FD000
heap
page read and write
DBC000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
B7C000
heap
page read and write
C49000
heap
page read and write
1ABA000
heap
page read and write
1B14000
heap
page read and write
242A000
trusted library allocation
page read and write
C28000
heap
page read and write
1AF1000
heap
page read and write
C35000
heap
page read and write
964000
heap
page read and write
2794000
heap
page read and write
2875000
heap
page read and write
1CF50000
heap
page read and write
DCF000
heap
page read and write
964000
heap
page read and write
D78000
heap
page read and write
15D1000
heap
page read and write
94C000
heap
page read and write
1606000
heap
page read and write
D77000
heap
page read and write
94C000
heap
page read and write
C28000
heap
page read and write
D98000
heap
page read and write
C12000
heap
page read and write
D98000
heap
page read and write
2708000
heap
page read and write
B49000
heap
page read and write
1B18000
heap
page read and write
11F6000
heap
page read and write
C35000
heap
page read and write
9A9000
heap
page read and write
947000
heap
page read and write
B84000
heap
page read and write
1B2B000
heap
page read and write
7FF718641000
unkown
page readonly
BAD000
heap
page read and write
C15000
heap
page read and write
E01000
heap
page read and write
DCB000
heap
page read and write
1AED000
heap
page read and write
DD0000
heap
page read and write
947000
heap
page read and write
DE0000
heap
page read and write
275F000
heap
page read and write
1217000
heap
page read and write
947000
heap
page read and write
1B106000
heap
page read and write
141E000
heap
page read and write
94C000
heap
page read and write
DBC000
heap
page read and write
97A000
heap
page read and write
D98000
heap
page read and write
C49000
heap
page read and write
92C000
heap
page read and write
D98000
heap
page read and write
9C5000
heap
page read and write
D2D000
heap
page read and write
B84000
heap
page read and write
B86000
heap
page read and write
D2D000
heap
page read and write
1AE1000
heap
page read and write
DE6000
heap
page read and write
DCF000
heap
page read and write
C03000
heap
page read and write
964000
heap
page read and write
1AB8000
heap
page read and write
66641000
unkown
page execute read
1AFD4000
heap
page read and write
C28000
heap
page read and write
937000
heap
page read and write
DFC000
heap
page read and write
9C5000
heap
page read and write
D98000
heap
page read and write
1AFA4000
heap
page read and write
1AD2000
heap
page read and write
DD0000
heap
page read and write
D30000
heap
page read and write
B68000
heap
page read and write
1AF1000
heap
page read and write
C13000
heap
page read and write
66706000
unkown
page readonly
1AE4000
heap
page read and write
242A000
trusted library allocation
page read and write
1B165000
heap
page read and write
D5F000
heap
page read and write
D98000
heap
page read and write
C2D000
heap
page read and write
DBC000
heap
page read and write
1D1A2000
heap
page read and write
CB2000
heap
page read and write
15DD000
heap
page read and write
B7E000
heap
page read and write
2423000
trusted library allocation
page read and write
1A53D000
heap
page read and write
138E000
heap
page read and write
B84000
heap
page read and write
1B2B000
heap
page read and write
1B2B000
heap
page read and write
7FF718641000
unkown
page readonly
B7E000
heap
page read and write
93B000
heap
page read and write
D77000
heap
page read and write
162F000
heap
page read and write
DCF000
heap
page read and write
242A000
trusted library allocation
page read and write
DCB000
heap
page read and write
B68000
heap
page read and write
1B2B000
heap
page read and write
C35000
heap
page read and write
C02000
heap
page read and write
DE0000
heap
page read and write
1502000
heap
page read and write
279F000
heap
page read and write
1CF41000
heap
page read and write
C12000
heap
page read and write
C28000
heap
page read and write
2908000
heap
page read and write
C28000
heap
page read and write
C03000
heap
page read and write
DF0000
heap
page read and write
DE3000
heap
page read and write
DF0000
heap
page read and write
DAC000
heap
page read and write
F51000
heap
page read and write
160C000
heap
page read and write
9C5000
heap
page read and write
29E5000
heap
page read and write
1AF8D000
heap
page read and write
B1B000
heap
page read and write
E01000
heap
page read and write
94C000
heap
page read and write
D30000
heap
page read and write
1B106000
heap
page read and write
C01000
heap
page read and write
D30000
heap
page read and write
23F2000
trusted library allocation
page read and write
7FF718611000
unkown
page execute read
160A000
heap
page read and write
D30000
heap
page read and write
D91000
heap
page read and write
1377000
heap
page read and write
93E000
heap
page read and write
D77000
heap
page read and write
1B2C000
heap
page read and write
2782000
heap
page read and write
D93000
heap
page read and write
DE0000
heap
page read and write
8D2000
heap
page read and write
DD0000
heap
page read and write
D98000
heap
page read and write
D9D000
heap
page read and write
B86000
heap
page read and write
1A546000
heap
page read and write
C35000
heap
page read and write
1B06000
heap
page read and write
D91000
heap
page read and write
DBC000
heap
page read and write
964000
heap
page read and write
B86000
heap
page read and write
D30000
heap
page read and write
1B14000
heap
page read and write
1B58000
heap
page read and write
D98000
heap
page read and write
1ACD000
heap
page read and write
12E5000
heap
page read and write
275C000
heap
page read and write
1A4E3000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
DAC000
heap
page read and write
D60000
heap
page read and write
B6C000
heap
page read and write
DBC000
heap
page read and write
1B1A000
heap
page read and write
DE0000
heap
page read and write
15ED000
heap
page read and write
51D5000
heap
page read and write
DF0000
heap
page read and write
9A9000
heap
page read and write
15CD000
heap
page read and write
B59000
heap
page read and write
D91000
heap
page read and write
1ACE000
heap
page read and write
C15000
heap
page read and write
928000
heap
page read and write
1B06000
heap
page read and write
D84000
heap
page read and write
DE6000
heap
page read and write
9A9000
heap
page read and write
DD0000
heap
page read and write
DCB000
heap
page read and write
275F000
heap
page read and write
DFC000
heap
page read and write
DF0000
heap
page read and write
B1F000
heap
page read and write
950000
heap
page read and write
D68000
heap
page read and write
666F4000
unkown
page write copy
DCB000
heap
page read and write
184F000
heap
page read and write
964000
heap
page read and write
1AF1000
heap
page read and write
D6F000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
15BA000
heap
page read and write
C2D000
heap
page read and write
C16000
heap
page read and write
4A81000
heap
page read and write
B4C000
heap
page read and write
DAC000
stack
page read and write
1ADE8000
heap
page read and write
1AE5000
heap
page read and write
2798000
heap
page read and write
D68000
heap
page read and write
D6B000
heap
page read and write
7FF718640000
unkown
page write copy
964000
heap
page read and write
1831000
heap
page read and write
1AC85000
heap
page read and write
1D045000
heap
page read and write
928000
heap
page read and write
1429000
heap
page read and write
C49000
heap
page read and write
953000
heap
page read and write
1ADC9000
heap
page read and write
D2D000
heap
page read and write
D7F000
heap
page read and write
1B01000
heap
page read and write
2442000
trusted library allocation
page read and write
DF0000
heap
page read and write
DE3000
heap
page read and write
1B17000
heap
page read and write
DF4000
heap
page read and write
1B58000
heap
page read and write
1AD1000
heap
page read and write
1B06000
heap
page read and write
15B4000
heap
page read and write
DFC000
heap
page read and write
DCB000
heap
page read and write
D5F000
heap
page read and write
1438000
heap
page read and write
1981000
heap
page read and write
91C000
heap
page read and write
DAD000
heap
page read and write
BF3000
heap
page read and write
C1E000
heap
page read and write
666D1000
unkown
page readonly
DCB000
heap
page read and write
C28000
heap
page read and write
D83000
heap
page read and write
C0D000
heap
page read and write
C1E000
heap
page read and write
D6E000
heap
page read and write
DE0000
heap
page read and write
950000
heap
page read and write
1B2B000
heap
page read and write
DF0000
heap
page read and write
D6F000
heap
page read and write
2442000
trusted library allocation
page read and write
7FF71863F000
unkown
page readonly
DF0000
heap
page read and write
953000
heap
page read and write
DE6000
heap
page read and write
1AF5000
heap
page read and write
23F2000
trusted library allocation
page read and write
1B11E000
heap
page read and write
1B09B000
heap
page read and write
14DA000
heap
page read and write
E01000
heap
page read and write
23F2000
trusted library allocation
page read and write
DCF000
heap
page read and write
DE0000
heap
page read and write
DD0000
heap
page read and write
D58000
heap
page read and write
1B057000
heap
page read and write
15F6000
heap
page read and write
C51000
heap
page read and write
11A3000
heap
page read and write
1AE1000
heap
page read and write
D91000
heap
page read and write
1AFD000
heap
page read and write
992000
heap
page read and write
DD0000
heap
page read and write
C15000
heap
page read and write
DF0000
heap
page read and write
C16000
heap
page read and write
DD0000
heap
page read and write
590000
heap
page read and write
1AF1000
heap
page read and write
1ABF000
heap
page read and write
DCB000
heap
page read and write
DFC000
heap
page read and write
278A000
heap
page read and write
D6D000
heap
page read and write
DBC000
heap
page read and write
276E000
heap
page read and write
1465000
heap
page read and write
1AF5000
heap
page read and write
DAD000
heap
page read and write
D70000
heap
page read and write
1CFC6000
heap
page read and write
94B000
heap
page read and write
15B9000
heap
page read and write
D3B000
heap
page read and write
DBC000
heap
page read and write
1B036000
heap
page read and write
DBC000
heap
page read and write
1AED000
heap
page read and write
C28000
heap
page read and write
DE6000
heap
page read and write
D8B000
heap
page read and write
930000
heap
page read and write
D73000
heap
page read and write
1AFD000
heap
page read and write
9C5000
heap
page read and write
DE6000
heap
page read and write
B86000
heap
page read and write
DF0000
heap
page read and write
C51000
heap
page read and write
1AF1000
heap
page read and write
B6C000
heap
page read and write
C49000
heap
page read and write
2442000
trusted library allocation
page read and write
DE0000
heap
page read and write
964000
heap
page read and write
B86000
heap
page read and write
B84000
heap
page read and write
C35000
heap
page read and write
1D1EF000
heap
page read and write
2797000
heap
page read and write
DD0000
heap
page read and write
D83000
heap
page read and write
1478000
heap
page read and write
D70000
heap
page read and write
DD0000
heap
page read and write
DAC000
heap
page read and write
928000
heap
page read and write
DC1000
heap
page read and write
DE0000
heap
page read and write
94C000
heap
page read and write
1377000
heap
page read and write
D31000
heap
page read and write
DBC000
heap
page read and write
1AF1000
heap
page read and write
D2F000
heap
page read and write
17D1000
heap
page read and write
3900000
heap
page read and write
941000
heap
page read and write
279D000
heap
page read and write
12FC000
stack
page read and write
DCF000
heap
page read and write
1B06000
heap
page read and write
160C000
heap
page read and write
1D162000
heap
page read and write
D83000
heap
page read and write
1B18000
heap
page read and write
2442000
trusted library allocation
page read and write
C2D000
heap
page read and write
DF0000
heap
page read and write
2442000
trusted library allocation
page read and write
D30000
heap
page read and write
D5F000
heap
page read and write
1981000
heap
page read and write
947000
heap
page read and write
1ACA1000
heap
page read and write
938000
heap
page read and write
D91000
heap
page read and write
276E000
heap
page read and write
C2D000
heap
page read and write
C49000
heap
page read and write
B7E000
heap
page read and write
964000
heap
page read and write
1AF1000
heap
page read and write
937000
heap
page read and write
1B06000
heap
page read and write
C28000
heap
page read and write
1606000
heap
page read and write
7FF718640000
unkown
page write copy
E01000
heap
page read and write
1AA4000
heap
page read and write
C15000
heap
page read and write
DD0000
heap
page read and write
D30000
heap
page read and write
1AF5000
heap
page read and write
D44000
heap
page read and write
2423000
trusted library allocation
page read and write
DF0000
heap
page read and write
B74000
heap
page read and write
1A688000
heap
page read and write
1B2B000
heap
page read and write
C49000
heap
page read and write
7FF718611000
unkown
page execute read
D98000
heap
page read and write
BED000
heap
page read and write
1AD9000
heap
page read and write
1AB4000
heap
page read and write
964000
heap
page read and write
D68000
heap
page read and write
C1E000
heap
page read and write
C49000
heap
page read and write
D31000
heap
page read and write
D83000
heap
page read and write
D83000
heap
page read and write
DBC000
heap
page read and write
B58000
heap
page read and write
666F7000
unkown
page read and write
B86000
heap
page read and write
DF4000
heap
page read and write
D30000
heap
page read and write
1AD2000
heap
page read and write
B63000
heap
page read and write
DE5000
heap
page read and write
D7F000
heap
page read and write
DE3000
heap
page read and write
1AE6000
heap
page read and write
C49000
heap
page read and write
D7F000
heap
page read and write
1B48000
heap
page read and write
23D3000
trusted library allocation
page read and write
E01000
heap
page read and write
1B06000
heap
page read and write
D68000
heap
page read and write
2442000
trusted library allocation
page read and write
D7C000
heap
page read and write
C28000
heap
page read and write
5B66000
heap
page read and write
D98000
heap
page read and write
12EB000
heap
page read and write
D98000
heap
page read and write
B49000
heap
page read and write
968000
heap
page read and write
DFC000
heap
page read and write
1483000
heap
page read and write
C28000
heap
page read and write
2423000
trusted library allocation
page read and write
C12000
heap
page read and write
E01000
heap
page read and write
D6D000
heap
page read and write
14CE000
heap
page read and write
160C000
heap
page read and write
1AEAE000
heap
page read and write
D0E000
heap
page read and write
DE6000
heap
page read and write
953000
heap
page read and write
953000
heap
page read and write
D98000
heap
page read and write
E01000
heap
page read and write
DE0000
heap
page read and write
C51000
heap
page read and write
275F000
heap
page read and write
2442000
trusted library allocation
page read and write
D84000
heap
page read and write
D5F000
heap
page read and write
E01000
heap
page read and write
B86000
heap
page read and write
D7F000
heap
page read and write
1AED000
heap
page read and write
DCB000
heap
page read and write
25CD000
heap
page read and write
DF4000
heap
page read and write
D4F000
heap
page read and write
DF0000
heap
page read and write
C49000
heap
page read and write
FDD000
heap
page read and write
7FF718610000
unkown
page readonly
DFC000
heap
page read and write
B6C000
heap
page read and write
1A354000
heap
page read and write
277E000
heap
page read and write
E7A000
heap
page read and write
DE0000
heap
page read and write
B5D000
heap
page read and write
1B17000
heap
page read and write
277B000
heap
page read and write
B5D000
heap
page read and write
23D3000
trusted library allocation
page read and write
F7E000
heap
page read and write
1B2B000
heap
page read and write
1AD2000
heap
page read and write
79E000
heap
page read and write
B58000
heap
page read and write
957000
heap
page read and write
12B2000
heap
page read and write
1B18000
heap
page read and write
DFC000
heap
page read and write
D6D000
heap
page read and write
DE6000
heap
page read and write
15E2000
heap
page read and write
2782000
heap
page read and write
2797000
heap
page read and write
DE6000
heap
page read and write
DBC000
heap
page read and write
1AD0C000
heap
page read and write
B74000
heap
page read and write
B84000
heap
page read and write
D6D000
heap
page read and write
D98000
heap
page read and write
15F2000
heap
page read and write
B84000
heap
page read and write
D6F000
heap
page read and write
DAC000
heap
page read and write
DF4000
heap
page read and write
1ADE8000
heap
page read and write
D8B000
heap
page read and write
B74000
heap
page read and write
D77000
heap
page read and write
DE6000
heap
page read and write
DCB000
heap
page read and write
29E1000
heap
page read and write
B68000
heap
page read and write
DFC000
heap
page read and write
2797000
heap
page read and write
1A3D8000
heap
page read and write
242A000
trusted library allocation
page read and write
1204000
heap
page read and write
E70000
heap
page read and write
D93000
heap
page read and write
1D12A000
heap
page read and write
12C5000
heap
page read and write
1281000
heap
page read and write
B5E000
heap
page read and write
1612000
heap
page read and write
D31000
heap
page read and write
DAC000
heap
page read and write
23DA000
trusted library allocation
page read and write
B86000
heap
page read and write
E01000
heap
page read and write
1D076000
heap
page read and write
D83000
heap
page read and write
1377000
heap
page read and write
1B106000
heap
page read and write
DF4000
heap
page read and write
D36000
heap
page read and write
D98000
heap
page read and write
B86000
heap
page read and write
1B58000
heap
page read and write
D8B000
heap
page read and write
B6C000
heap
page read and write
242A000
trusted library allocation
page read and write
DFC000
heap
page read and write
9C5000
heap
page read and write
DE3000
heap
page read and write
242A000
trusted library allocation
page read and write
DE0000
heap
page read and write
DD0000
heap
page read and write
DFC000
heap
page read and write
1B48000
heap
page read and write
DE6000
heap
page read and write
1A5B6000
heap
page read and write
1AF1000
heap
page read and write
DAC000
heap
page read and write
276E000
heap
page read and write
B86000
heap
page read and write
B68000
heap
page read and write
28BC000
heap
page read and write
DF0000
heap
page read and write
D98000
heap
page read and write
B49000
heap
page read and write
D30000
heap
page read and write
B3E000
heap
page read and write
99A000
heap
page read and write
93D000
heap
page read and write
666D1000
unkown
page readonly
953000
heap
page read and write
DBC000
heap
page read and write
4D10000
heap
page read and write
C16000
heap
page read and write
1B0BE000
heap
page read and write
DCB000
heap
page read and write
DE0000
heap
page read and write
1AF48000
heap
page read and write
C49000
heap
page read and write
C53000
heap
page read and write
2798000
heap
page read and write
D91000
heap
page read and write
DF4000
heap
page read and write
DFC000
heap
page read and write
D83000
heap
page read and write
2442000
trusted library allocation
page read and write
953000
heap
page read and write
D98000
heap
page read and write
DE0000
heap
page read and write
1B1C000
heap
page read and write
C35000
heap
page read and write
B7E000
heap
page read and write
277E000
heap
page read and write
D68000
heap
page read and write
15D2000
heap
page read and write
DF4000
heap
page read and write
DF0000
heap
page read and write
D60000
heap
page read and write
DE6000
heap
page read and write
DE3000
heap
page read and write
DD0000
heap
page read and write
C2D000
heap
page read and write
1CFD7000
heap
page read and write
279F000
heap
page read and write
DE6000
heap
page read and write
FD0000
heap
page read and write
15D2000
heap
page read and write
D77000
heap
page read and write
1AF8A000
heap
page read and write
1AFA000
heap
page read and write
DCB000
heap
page read and write
DCB000
heap
page read and write
1AF2C000
heap
page read and write
940000
heap
page read and write
DCB000
heap
page read and write
DBC000
heap
page read and write
1963000
heap
page read and write
D2D000
heap
page read and write
D31000
heap
page read and write
1377000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
93F000
heap
page read and write
600000
heap
page read and write
1AF3C000
heap
page read and write
D84000
heap
page read and write
B0D000
heap
page read and write
160A000
heap
page read and write
1D1CD000
heap
page read and write
D98000
heap
page read and write
D30000
heap
page read and write
95D000
heap
page read and write
947000
heap
page read and write
B49000
heap
page read and write
41D000
unkown
page readonly
D7F000
heap
page read and write
947000
heap
page read and write
1AF8A000
heap
page read and write
1B48000
heap
page read and write
193B000
heap
page read and write
1A58D000
heap
page read and write
D68000
heap
page read and write
1200000
heap
page read and write
12C5000
heap
page read and write
9C5000
heap
page read and write
242A000
trusted library allocation
page read and write
E01000
heap
page read and write
1B27000
heap
page read and write
DCF000
heap
page read and write
2790000
heap
page read and write
966000
heap
page read and write
957000
heap
page read and write
2442000
trusted library allocation
page read and write
DE3000
heap
page read and write
1AED000
heap
page read and write
DF0000
heap
page read and write
7FF71863D000
unkown
page read and write
D2D000
heap
page read and write
160C000
heap
page read and write
DCF000
heap
page read and write
D83000
heap
page read and write
C0C000
heap
page read and write
DD0000
heap
page read and write
DE0000
heap
page read and write
1A688000
heap
page read and write
D73000
heap
page read and write
C15000
heap
page read and write
E01000
heap
page read and write
620000
heap
page read and write
DBC000
heap
page read and write
C49000
heap
page read and write
928000
heap
page read and write
D5F000
heap
page read and write
DCF000
heap
page read and write
D7F000
heap
page read and write
D70000
heap
page read and write
E01000
heap
page read and write
DBC000
heap
page read and write
D31000
heap
page read and write
DFC000
heap
page read and write
1B10F000
heap
page read and write
278A000
heap
page read and write
DAC000
heap
page read and write
277E000
heap
page read and write
11A2000
heap
page read and write
23F2000
trusted library allocation
page read and write
1A53D000
heap
page read and write
1B14000
heap
page read and write
E01000
heap
page read and write
DCB000
heap
page read and write
DFC000
heap
page read and write
D91000
heap
page read and write
2423000
trusted library allocation
page read and write
D2D000
heap
page read and write
16EE000
heap
page read and write
274E000
heap
page read and write
D93000
heap
page read and write
277B000
heap
page read and write
1ACD000
heap
page read and write
C49000
heap
page read and write
E01000
heap
page read and write
1AFA4000
heap
page read and write
7FF718640000
unkown
page write copy
1A48000
heap
page read and write
7FF718610000
unkown
page readonly
1AE1000
heap
page read and write
DCF000
heap
page read and write
1ADA0000
heap
page read and write
D91000
heap
page read and write
666F7000
unkown
page read and write
E01000
heap
page read and write
B86000
heap
page read and write
196E000
heap
page read and write
C49000
heap
page read and write
C49000
heap
page read and write
95D000
heap
page read and write
964000
heap
page read and write
C12000
heap
page read and write
E01000
heap
page read and write
DD0000
heap
page read and write
953000
heap
page read and write
B86000
heap
page read and write
169A000
heap
page read and write
2790000
heap
page read and write
B74000
heap
page read and write
B84000
heap
page read and write
DAC000
heap
page read and write
9A9000
heap
page read and write
B59000
heap
page read and write
1AD4000
heap
page read and write
15D1000
heap
page read and write
DFC000
heap
page read and write
5BEC000
heap
page read and write
2392000
trusted library allocation
page read and write
C15000
heap
page read and write
1AD90000
heap
page read and write
964000
heap
page read and write
1952000
heap
page read and write
275F000
heap
page read and write
160C000
heap
page read and write
953000
heap
page read and write
C28000
heap
page read and write
7FF71863F000
unkown
page readonly
E01000
heap
page read and write
D77000
heap
page read and write
E01000
heap
page read and write
4CAF000
heap
page read and write
12C5000
heap
page read and write
97D000
heap
page read and write
928000
heap
page read and write
66641000
unkown
page execute read
1B14000
heap
page read and write
C1E000
heap
page read and write
B6C000
heap
page read and write
D91000
heap
page read and write
E01000
heap
page read and write
1AFD000
heap
page read and write
D84000
heap
page read and write
93C000
heap
page read and write
1B12D000
heap
page read and write
7FF71863D000
unkown
page read and write
E01000
heap
page read and write
950000
heap
page read and write
D77000
heap
page read and write
C11000
heap
page read and write
DCF000
heap
page read and write
D4F000
heap
page read and write
15FD000
heap
page read and write
242A000
trusted library allocation
page read and write
1E0000
heap
page read and write
DFC000
heap
page read and write
DAC000
heap
page read and write
1D034000
heap
page read and write
D39000
heap
page read and write
1AC3000
heap
page read and write
D73000
heap
page read and write
DCF000
heap
page read and write
DBC000
heap
page read and write
DF4000
heap
page read and write
DE5000
heap
page read and write
D93000
heap
page read and write
7FF718641000
unkown
page readonly
DEB000
heap
page read and write
7FF718611000
unkown
page execute read
DD0000
heap
page read and write
C41000
heap
page read and write
DBC000
heap
page read and write
DD0000
heap
page read and write
242A000
trusted library allocation
page read and write
666F7000
unkown
page read and write
1B06000
heap
page read and write
1AD12000
heap
page read and write
1B18000
heap
page read and write
D68000
heap
page read and write
1B1C000
heap
page read and write
DE0000
heap
page read and write
DF4000
heap
page read and write
1B14000
heap
page read and write
D6F000
heap
page read and write
1606000
heap
page read and write
1AFCC000
heap
page read and write
1AFFE000
heap
page read and write
C33000
heap
page read and write
DE0000
heap
page read and write
1ADC000
heap
page read and write
D68000
heap
page read and write
1281000
heap
page read and write
957000
heap
page read and write
D83000
heap
page read and write
2538000
heap
page read and write
DCF000
heap
page read and write
DD0000
heap
page read and write
2442000
trusted library allocation
page read and write
98A000
heap
page read and write
DBC000
heap
page read and write
7FF718610000
unkown
page readonly
DD0000
heap
page read and write
1B065000
heap
page read and write
1B1A000
heap
page read and write
B86000
heap
page read and write
D98000
heap
page read and write
D2D000
heap
page read and write
23F2000
trusted library allocation
page read and write
1B06000
heap
page read and write
B7D000
heap
page read and write
1AFDF000
heap
page read and write
B49000
heap
page read and write
DCF000
heap
page read and write
1B12E000
heap
page read and write
1B14000
heap
page read and write
B86000
heap
page read and write
DFC000
heap
page read and write
B59000
heap
page read and write
1D11A000
heap
page read and write
DD0000
heap
page read and write
2442000
trusted library allocation
page read and write
B68000
heap
page read and write
C2D000
heap
page read and write
DE5000
heap
page read and write
D7F000
heap
page read and write
B6C000
heap
page read and write
2782000
heap
page read and write
93F000
heap
page read and write
928000
heap
page read and write
4CE2000
heap
page read and write
1AFE6000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
DF0000
heap
page read and write
2423000
trusted library allocation
page read and write
B59000
heap
page read and write
277B000
heap
page read and write
E01000
heap
page read and write
1AF1000
heap
page read and write
1AD2000
heap
page read and write
C28000
heap
page read and write
D57000
heap
page read and write
9A9000
heap
page read and write
C33000
heap
page read and write
DE6000
heap
page read and write
C28000
heap
page read and write
242A000
trusted library allocation
page read and write
DE5000
heap
page read and write
279D000
heap
page read and write
B68000
heap
page read and write
1D06E000
heap
page read and write
C28000
heap
page read and write
C2D000
heap
page read and write
1B39000
heap
page read and write
DD0000
heap
page read and write
DFC000
heap
page read and write
D98000
heap
page read and write
C49000
heap
page read and write
964000
heap
page read and write
1AF08000
heap
page read and write
1B255000
heap
page read and write
15FD000
heap
page read and write
12C9000
heap
page read and write
D77000
heap
page read and write
23DA000
trusted library allocation
page read and write
DE0000
heap
page read and write
B6C000
heap
page read and write
E01000
heap
page read and write
DD0000
heap
page read and write
FF4000
heap
page read and write
B7D000
heap
page read and write
DE0000
heap
page read and write
DF4000
heap
page read and write
186B000
heap
page read and write
277E000
heap
page read and write
15E4000
heap
page read and write
1AF3C000
heap
page read and write
277E000
heap
page read and write
D8B000
heap
page read and write
23F2000
trusted library allocation
page read and write
E01000
heap
page read and write
D98000
heap
page read and write
B68000
heap
page read and write
BF3000
heap
page read and write
E01000
heap
page read and write
CF2000
heap
page read and write
1B18000
heap
page read and write
B86000
heap
page read and write
1AE73000
heap
page read and write
9C5000
heap
page read and write
1B125000
heap
page read and write
DBC000
heap
page read and write
DCF000
heap
page read and write
19C6000
heap
page read and write
242A000
trusted library allocation
page read and write
188D000
heap
page read and write
B86000
heap
page read and write
D4F000
heap
page read and write
B84000
heap
page read and write
DBC000
heap
page read and write
E01000
heap
page read and write
7FF71863F000
unkown
page readonly
B2F000
heap
page read and write
29E1000
heap
page read and write
1963000
heap
page read and write
DFC000
heap
page read and write
1AE60000
heap
page read and write
1B38000
heap
page read and write
AEC000
heap
page read and write
1B2B000
heap
page read and write
DAD000
heap
page read and write
9A9000
heap
page read and write
1606000
heap
page read and write
666FA000
unkown
page readonly
11A1000
heap
page read and write
2442000
trusted library allocation
page read and write
DE0000
heap
page read and write
D77000
heap
page read and write
DD0000
heap
page read and write
DAD000
heap
page read and write
149A000
heap
page read and write
1AA4000
heap
page read and write
981000
heap
page read and write
2423000
trusted library allocation
page read and write
DCF000
heap
page read and write
9C5000
heap
page read and write
DCF000
heap
page read and write
D91000
heap
page read and write
1AE4000
heap
page read and write
1D211000
heap
page read and write
1483000
heap
page read and write
E01000
heap
page read and write
DFC000
heap
page read and write
B68000
heap
page read and write
1AED000
heap
page read and write
15C4000
heap
page read and write
94C000
heap
page read and write
1AFEF000
heap
page read and write
1AE5000
heap
page read and write
2794000
heap
page read and write
DFC000
heap
page read and write
DE0000
heap
page read and write
1B06000
heap
page read and write
2790000
heap
page read and write
DCF000
heap
page read and write
B5B000
heap
page read and write
D31000
heap
page read and write
1AE1000
heap
page read and write
928000
heap
page read and write
D77000
heap
page read and write
DD0000
heap
page read and write
1A506000
heap
page read and write
985000
heap
page read and write
968000
heap
page read and write
1A4A2000
heap
page read and write
279F000
heap
page read and write
93C000
heap
page read and write
7FF718632000
unkown
page readonly
7FF718640000
unkown
page read and write
B2B000
heap
page read and write
1606000
heap
page read and write
BE3000
heap
page read and write
1AD51000
heap
page read and write
15F1000
heap
page read and write
D5F000
heap
page read and write
947000
heap
page read and write
D43000
heap
page read and write
2797000
heap
page read and write
C1E000
heap
page read and write
B74000
heap
page read and write
9A9000
heap
page read and write
D70000
heap
page read and write
1AD2C000
heap
page read and write
DAD000
heap
page read and write
928000
heap
page read and write
E01000
heap
page read and write
1B06000
heap
page read and write
160A000
heap
page read and write
1A449000
heap
page read and write
DCF000
heap
page read and write
124E000
heap
page read and write
1B036000
heap
page read and write
DE0000
heap
page read and write
9C5000
heap
page read and write
D98000
heap
page read and write
D83000
heap
page read and write
D98000
heap
page read and write
160C000
heap
page read and write
66640000
unkown
page readonly
274C000
heap
page read and write
D7C000
heap
page read and write
C49000
heap
page read and write
8FE000
heap
page read and write
1B18000
heap
page read and write
C2D000
heap
page read and write
1B2B000
heap
page read and write
C2D000
heap
page read and write
276E000
heap
page read and write
1AD2000
heap
page read and write
DF0000
heap
page read and write
964000
heap
page read and write
C35000
heap
page read and write
1B181000
heap
page read and write
1281000
heap
page read and write
928000
heap
page read and write
B85000
heap
page read and write
D83000
heap
page read and write
D98000
heap
page read and write
23DA000
trusted library allocation
page read and write
DF4000
heap
page read and write
DAC000
heap
page read and write
275F000
heap
page read and write
7FF71863D000
unkown
page read and write
D60000
heap
page read and write
1AFD000
heap
page read and write
1AD2000
heap
page read and write
1606000
heap
page read and write
C2D000
heap
page read and write
C03000
heap
page read and write
B6C000
heap
page read and write
2423000
trusted library allocation
page read and write
4A4000
heap
page read and write
1AA4000
heap
page read and write
B84000
heap
page read and write
28B1000
heap
page read and write
DAC000
heap
page read and write
B84000
heap
page read and write
1627000
heap
page read and write
1AF5000
heap
page read and write
D30000
heap
page read and write
DE3000
heap
page read and write
2768000
heap
page read and write
1AEE6000
heap
page read and write
FA0000
heap
page read and write
DE0000
heap
page read and write
1377000
heap
page read and write
D30000
heap
page read and write
150D000
heap
page read and write
1B0C6000
heap
page read and write
928000
heap
page read and write
5B90000
heap
page read and write
964000
heap
page read and write
B67000
heap
page read and write
94C000
heap
page read and write
911000
heap
page read and write
E01000
heap
page read and write
D7F000
heap
page read and write
1A4A2000
heap
page read and write
1AD2000
heap
page read and write
DCF000
heap
page read and write
DE3000
heap
page read and write
B86000
heap
page read and write
1D10C000
heap
page read and write
1AFD000
heap
page read and write
2442000
trusted library allocation
page read and write
964000
heap
page read and write
1AFAB000
heap
page read and write
2442000
trusted library allocation
page read and write
D2D000
heap
page read and write
B59000
heap
page read and write
7FF718610000
unkown
page readonly
1B22000
heap
page read and write
15C2000
heap
page read and write
1AD9000
heap
page read and write
D7F000
heap
page read and write
DD0000
heap
page read and write
E01000
heap
page read and write
C05000
heap
page read and write
1AE1000
heap
page read and write
23D3000
trusted library allocation
page read and write
5F4000
heap
page read and write
DF4000
heap
page read and write
2423000
trusted library allocation
page read and write
B86000
heap
page read and write
2442000
trusted library allocation
page read and write
938000
heap
page read and write
D98000
heap
page read and write
E75000
heap
page read and write
D6F000
heap
page read and write
D98000
heap
page read and write
11CF000
stack
page read and write
D6F000
heap
page read and write
C28000
heap
page read and write
D98000
heap
page read and write
E01000
heap
page read and write
C49000
heap
page read and write
91C000
heap
page read and write
1420000
heap
page read and write
29E8000
heap
page read and write
7FF718610000
unkown
page readonly
E01000
heap
page read and write
242A000
trusted library allocation
page read and write
D84000
heap
page read and write
B58000
heap
page read and write
2790000
heap
page read and write
15D1000
heap
page read and write
5100000
heap
page read and write
1D076000
heap
page read and write
B86000
heap
page read and write
1603000
heap
page read and write
B58000
heap
page read and write
D91000
heap
page read and write
162F000
heap
page read and write
DD0000
heap
page read and write
D30000
heap
page read and write
957000
heap
page read and write
D83000
heap
page read and write
94C000
heap
page read and write
BEF000
heap
page read and write
C28000
heap
page read and write
1AE1000
heap
page read and write
1AB8000
heap
page read and write
98A000
heap
page read and write
1ACC000
heap
page read and write
B58000
heap
page read and write
98A000
heap
page read and write
1AF1000
heap
page read and write
DF0000
heap
page read and write
64A000
heap
page read and write
964000
heap
page read and write
1981000
heap
page read and write
666F4000
unkown
page write copy
1AE9000
heap
page read and write
1ACE6000
heap
page read and write
2790000
heap
page read and write
1AC3000
heap
page read and write
1AF9000
heap
page read and write
DF4000
heap
page read and write
5C81000
heap
page read and write
1B2B000
heap
page read and write
1B1C000
heap
page read and write
D98000
heap
page read and write
D44000
heap
page read and write
DF0000
heap
page read and write
93E000
heap
page read and write
B86000
heap
page read and write
DCF000
heap
page read and write
E01000
heap
page read and write
1A409000
heap
page read and write
B58000
heap
page read and write
1B14000
heap
page read and write
1B036000
heap
page read and write
94C000
heap
page read and write
D39000
heap
page read and write
DAD000
heap
page read and write
B84000
heap
page read and write
DBC000
heap
page read and write
1AF5000
heap
page read and write
DE3000
heap
page read and write
27D3000
heap
page read and write
1AE1000
heap
page read and write
160A000
heap
page read and write
BF3000
heap
page read and write
23D3000
trusted library allocation
page read and write
1AF5000
heap
page read and write
C35000
heap
page read and write
1D1CD000
heap
page read and write
1AD2000
heap
page read and write
DE0000
heap
page read and write
1B14000
heap
page read and write
D5F000
heap
page read and write
1191000
heap
page read and write
B58000
heap
page read and write
182E000
heap
page read and write
DBC000
heap
page read and write
94C000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
160C000
heap
page read and write
D31000
heap
page read and write
D4F000
heap
page read and write
1B14000
heap
page read and write
DFC000
heap
page read and write
2442000
trusted library allocation
page read and write
DD0000
heap
page read and write
96C000
heap
page read and write
DD0000
heap
page read and write
D31000
heap
page read and write
88B000
heap
page read and write
C49000
heap
page read and write
B7C000
heap
page read and write
D77000
heap
page read and write
9C5000
heap
page read and write
D73000
heap
page read and write
C49000
heap
page read and write
E01000
heap
page read and write
DFC000
heap
page read and write
15FD000
heap
page read and write
E01000
heap
page read and write
C16000
heap
page read and write
9A9000
heap
page read and write
1AD28000
heap
page read and write
2794000
heap
page read and write
D40000
heap
page read and write
DBC000
heap
page read and write
E01000
heap
page read and write
2A70000
heap
page read and write
15DE000
heap
page read and write
DCB000
heap
page read and write
D91000
heap
page read and write
C49000
heap
page read and write
DCF000
heap
page read and write
964000
heap
page read and write
D7C000
heap
page read and write
DF0000
heap
page read and write
E01000
heap
page read and write
B84000
heap
page read and write
B7E000
heap
page read and write
E01000
heap
page read and write
943000
heap
page read and write
D93000
heap
page read and write
991000
heap
page read and write
29DD000
heap
page read and write
1A536000
heap
page read and write
D6D000
heap
page read and write
15C4000
heap
page read and write
C49000
heap
page read and write
9C5000
heap
page read and write
DFC000
heap
page read and write
29E8000
heap
page read and write
1AE20000
heap
page read and write
B74000
heap
page read and write
274C000
heap
page read and write
DCB000
heap
page read and write
15ED000
heap
page read and write
15B6000
heap
page read and write
1AED000
heap
page read and write
12FD000
heap
page read and write
E01000
heap
page read and write
B7E000
heap
page read and write
E01000
heap
page read and write
1AE1000
heap
page read and write
D31000
heap
page read and write
DE0000
heap
page read and write
1B27000
heap
page read and write
D7C000
heap
page read and write
1284000
heap
page read and write
D30000
heap
page read and write
DE3000
heap
page read and write
C02000
heap
page read and write
2432000
trusted library allocation
page read and write
274C000
heap
page read and write
B3B000
heap
page read and write
C02000
heap
page read and write
DAC000
heap
page read and write
DE0000
heap
page read and write
D93000
heap
page read and write
DE3000
heap
page read and write
15F1000
heap
page read and write
957000
heap
page read and write
1B14000
heap
page read and write
B6C000
heap
page read and write
C28000
heap
page read and write
2442000
trusted library allocation
page read and write
CF4000
heap
page read and write
E01000
heap
page read and write
1AD9000
heap
page read and write
14DA000
heap
page read and write
DCF000
heap
page read and write
1AFD000
heap
page read and write
95D000
heap
page read and write
2442000
trusted library allocation
page read and write
B74000
heap
page read and write
1AF61000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
DCB000
heap
page read and write
C28000
heap
page read and write
DCF000
heap
page read and write
B7E000
heap
page read and write
C49000
heap
page read and write
15F2000
heap
page read and write
1D162000
heap
page read and write
275C000
heap
page read and write
D5F000
heap
page read and write
DFC000
heap
page read and write
29DD000
heap
page read and write
1AD2000
heap
page read and write
1B14000
heap
page read and write
4DC1000
heap
page read and write
DEB000
heap
page read and write
1606000
heap
page read and write
2442000
trusted library allocation
page read and write
C2D000
heap
page read and write
9A9000
heap
page read and write
1AFD000
heap
page read and write
BEC000
heap
page read and write
1AFAB000
heap
page read and write
DCF000
heap
page read and write
B86000
heap
page read and write
1AD7000
heap
page read and write
992000
heap
page read and write
278A000
heap
page read and write
D84000
heap
page read and write
29DD000
heap
page read and write
D98000
heap
page read and write
D83000
heap
page read and write
1AE61000
heap
page read and write
D50000
heap
page read and write
D60000
heap
page read and write
1234000
heap
page read and write
1AD45000
heap
page read and write
C2D000
heap
page read and write
DBC000
heap
page read and write
DBC000
heap
page read and write
C2D000
heap
page read and write
160A000
heap
page read and write
953000
heap
page read and write
C14000
heap
page read and write
D6F000
heap
page read and write
15E2000
heap
page read and write
DD0000
heap
page read and write
C15000
heap
page read and write
1B248000
heap
page read and write
9A9000
heap
page read and write
1ACE000
heap
page read and write
D98000
heap
page read and write
D30000
heap
page read and write
1AE6000
heap
page read and write
D4F000
heap
page read and write
276E000
heap
page read and write
DF4000
heap
page read and write
953000
heap
page read and write
DBC000
heap
page read and write
2714000
heap
page read and write
1AFD000
heap
page read and write
1AFD000
heap
page read and write
D6E000
heap
page read and write
B63000
heap
page read and write
23F2000
trusted library allocation
page read and write
7FF71863D000
unkown
page write copy
15FD000
heap
page read and write
3066000
heap
page read and write
DAC000
heap
page read and write
1AED000
heap
page read and write
964000
heap
page read and write
DF0000
heap
page read and write
E01000
heap
page read and write
937000
heap
page read and write
1606000
heap
page read and write
DF4000
heap
page read and write
B86000
heap
page read and write
1B2B000
heap
page read and write
1B106000
heap
page read and write
C33000
heap
page read and write
1971000
heap
page read and write
D30000
heap
page read and write
95D000
heap
page read and write
DD0000
heap
page read and write
242A000
trusted library allocation
page read and write
B6C000
heap
page read and write
274C000
heap
page read and write
953000
heap
page read and write
928000
heap
page read and write
C2D000
heap
page read and write
DD0000
heap
page read and write
D91000
heap
page read and write
D98000
heap
page read and write
1AB8000
heap
page read and write
2442000
trusted library allocation
page read and write
1623000
heap
page read and write
23DA000
trusted library allocation
page read and write
1B38000
heap
page read and write
1AE1000
heap
page read and write
E01000
heap
page read and write
19B4000
heap
page read and write
C28000
heap
page read and write
1AD2000
heap
page read and write
928000
heap
page read and write
9A9000
heap
page read and write
1AD2000
heap
page read and write
1AFA4000
heap
page read and write
928000
heap
page read and write
1B2B000
heap
page read and write
DE3000
heap
page read and write
9C5000
heap
page read and write
279F000
heap
page read and write
1B2B000
heap
page read and write
D83000
heap
page read and write
D35000
heap
page read and write
2442000
trusted library allocation
page read and write
E01000
heap
page read and write
1B06000
heap
page read and write
D60000
heap
page read and write
93C000
heap
page read and write
D9D000
heap
page read and write
1A606000
heap
page read and write
1B2B000
heap
page read and write
DE5000
heap
page read and write
D91000
heap
page read and write
1B06000
heap
page read and write
2423000
trusted library allocation
page read and write
B5A000
heap
page read and write
DC0000
heap
page read and write
964000
heap
page read and write
400000
unkown
page readonly
2782000
heap
page read and write
1606000
heap
page read and write
BFD000
heap
page read and write
D91000
heap
page read and write
7FF718640000
unkown
page write copy
C0E000
heap
page read and write
DF4000
heap
page read and write
1AFAB000
heap
page read and write
1D1DB000
heap
page read and write
DE3000
heap
page read and write
1AF4F000
heap
page read and write
DAC000
heap
page read and write
9C5000
heap
page read and write
C49000
heap
page read and write
1502000
heap
page read and write
D98000
heap
page read and write
95D000
heap
page read and write
D68000
heap
page read and write
64D000
heap
page read and write
1AE1000
heap
page read and write
B86000
heap
page read and write
953000
heap
page read and write
94C000
heap
page read and write
B78000
heap
page read and write
1B2B000
heap
page read and write
D77000
heap
page read and write
DE8000
heap
page read and write
D73000
heap
page read and write
1AFD000
heap
page read and write
279F000
heap
page read and write
BF3000
heap
page read and write
178F000
stack
page read and write
B86000
heap
page read and write
9C5000
heap
page read and write
1B137000
heap
page read and write
95D000
heap
page read and write
1B14000
heap
page read and write
1D12A000
heap
page read and write
D31000
heap
page read and write
D83000
heap
page read and write
2442000
trusted library allocation
page read and write
DCB000
heap
page read and write
1A522000
heap
page read and write
15F6000
heap
page read and write
D93000
heap
page read and write
1AF5000
heap
page read and write
242A000
trusted library allocation
page read and write
D31000
heap
page read and write
1571000
heap
page read and write
1B1C000
heap
page read and write
D5F000
heap
page read and write
1AFD000
heap
page read and write
1AD68000
heap
page read and write
5B57000
heap
page read and write
1627000
heap
page read and write
4A9000
heap
page read and write
15F6000
heap
page read and write
9A9000
heap
page read and write
D7F000
heap
page read and write
196D000
heap
page read and write
D7C000
heap
page read and write
93B000
heap
page read and write
1AFD000
heap
page read and write
9A9000
heap
page read and write
DF4000
heap
page read and write
93E000
heap
page read and write
2964000
heap
page read and write
DAC000
heap
page read and write
1AE7000
heap
page read and write
DE0000
heap
page read and write
D98000
heap
page read and write
2423000
trusted library allocation
page read and write
1A4C000
heap
page read and write
2798000
heap
page read and write
1B2B000
heap
page read and write
1ADC000
heap
page read and write
666F7000
unkown
page read and write
160A000
heap
page read and write
182A000
heap
page read and write
D98000
heap
page read and write
951000
heap
page read and write
7FF718632000
unkown
page readonly
E01000
heap
page read and write
DCF000
heap
page read and write
D9D000
heap
page read and write
E01000
heap
page read and write
666F4000
unkown
page write copy
D2C000
heap
page read and write
66702000
unkown
page execute
DE3000
heap
page read and write
23DA000
trusted library allocation
page read and write
947000
heap
page read and write
1AD05000
heap
page read and write
2790000
heap
page read and write
1281000
heap
page read and write
D30000
heap
page read and write
4BF6000
heap
page read and write
DF0000
heap
page read and write
B78000
heap
page read and write
1911000
heap
page read and write
1AB8000
heap
page read and write
666D1000
unkown
page readonly
11D0000
heap
page read and write
D50000
heap
page read and write
DCF000
heap
page read and write
DF0000
heap
page read and write
1D06E000
heap
page read and write
D5F000
heap
page read and write
1B2B000
heap
page read and write
12C5000
heap
page read and write
276E000
heap
page read and write
9C5000
heap
page read and write
7FF718610000
unkown
page readonly
B58000
heap
page read and write
B27000
heap
page read and write
D91000
heap
page read and write
242A000
trusted library allocation
page read and write
2423000
trusted library allocation
page read and write
964000
heap
page read and write
B68000
heap
page read and write
B49000
heap
page read and write
DCB000
heap
page read and write
275C000
heap
page read and write
2790000
heap
page read and write
1AF5000
heap
page read and write
C49000
heap
page read and write
C1E000
heap
page read and write
278A000
heap
page read and write
D83000
heap
page read and write
DCF000
heap
page read and write
DCB000
heap
page read and write
D7F000
heap
page read and write
1B22F000
heap
page read and write
D93000
heap
page read and write
1B17000
heap
page read and write
B74000
heap
page read and write
DD0000
heap
page read and write
29E1000
heap
page read and write
B86000
heap
page read and write
950000
heap
page read and write
12C5000
heap
page read and write
D98000
heap
page read and write
DAC000
heap
page read and write
B68000
heap
page read and write
98A000
heap
page read and write
B41000
heap
page read and write
274C000
heap
page read and write
B58000
heap
page read and write
D2D000
heap
page read and write
23F2000
trusted library allocation
page read and write
DD0000
heap
page read and write
15F1000
heap
page read and write
1AE86000
heap
page read and write
C15000
heap
page read and write
C05000
heap
page read and write
DF0000
heap
page read and write
23F2000
trusted library allocation
page read and write
2423000
trusted library allocation
page read and write
C16000
heap
page read and write
14E2000
heap
page read and write
242A000
trusted library allocation
page read and write
7E1000
heap
page read and write
9C5000
heap
page read and write
B7E000
heap
page read and write
D84000
heap
page read and write
1413000
heap
page read and write
1AD2000
heap
page read and write
1B18000
heap
page read and write
D35000
heap
page read and write
B10000
heap
page read and write
666D1000
unkown
page readonly
957000
heap
page read and write
1AC9C000
heap
page read and write
29DD000
heap
page read and write
D91000
heap
page read and write
242A000
trusted library allocation
page read and write
7FF71863F000
unkown
page readonly
BA4000
heap
page read and write
A8F000
stack
page read and write
7FF718610000
unkown
page readonly
1AE1000
heap
page read and write
D3B000
heap
page read and write
DD0000
heap
page read and write
DF4000
heap
page read and write
E01000
heap
page read and write
D68000
heap
page read and write
DFC000
heap
page read and write
DCF000
heap
page read and write
975000
heap
page read and write
1ADF9000
heap
page read and write
DAC000
heap
page read and write
DE0000
heap
page read and write
15F1000
heap
page read and write
D50000
heap
page read and write
964000
heap
page read and write
D6B000
heap
page read and write
1824000
heap
page read and write
C49000
heap
page read and write
DAC000
heap
page read and write
C35000
heap
page read and write
979000
heap
page read and write
E01000
heap
page read and write
1B14000
heap
page read and write
1AFD7000
heap
page read and write
242A000
trusted library allocation
page read and write
DE3000
heap
page read and write
916000
heap
page read and write
D7F000
heap
page read and write
E01000
heap
page read and write
940000
heap
page read and write
1D034000
heap
page read and write
DCF000
heap
page read and write
12EB000
heap
page read and write
C28000
heap
page read and write
C1E000
heap
page read and write
C12000
heap
page read and write
1A522000
heap
page read and write
2423000
trusted library allocation
page read and write
FF5000
heap
page read and write
928000
heap
page read and write
937000
heap
page read and write
1AFD000
heap
page read and write
DCF000
heap
page read and write
C33000
heap
page read and write
93E000
heap
page read and write
277E000
heap
page read and write
DFC000
heap
page read and write
1D1A2000
heap
page read and write
242A000
trusted library allocation
page read and write
2442000
trusted library allocation
page read and write
7FF718610000
unkown
page readonly
E01000
heap
page read and write
1B2B000
heap
page read and write
D98000
heap
page read and write
DBC000
heap
page read and write
2442000
trusted library allocation
page read and write
B58000
heap
page read and write
D7B000
heap
page read and write
1541000
heap
page read and write
1B2B000
heap
page read and write
979000
heap
page read and write
3911000
heap
page read and write
2442000
trusted library allocation
page read and write
1AD2000
heap
page read and write
D93000
heap
page read and write
DCB000
heap
page read and write
C49000
heap
page read and write
15DD000
heap
page read and write
B86000
heap
page read and write
D5F000
heap
page read and write
928000
heap
page read and write
23DA000
trusted library allocation
page read and write
D98000
heap
page read and write
B4A000
heap
page read and write
E01000
heap
page read and write
C0D000
heap
page read and write
C1E000
heap
page read and write
B49000
heap
page read and write
964000
heap
page read and write
C35000
heap
page read and write
B7D000
heap
page read and write
981000
heap
page read and write
160A000
heap
page read and write
B74000
heap
page read and write
1AC8D000
heap
page read and write
94C000
heap
page read and write
C1E000
heap
page read and write
DD0000
heap
page read and write
242A000
trusted library allocation
page read and write
DF0000
heap
page read and write
937000
heap
page read and write
7FF71863F000
unkown
page readonly
242A000
trusted library allocation
page read and write
B68000
heap
page read and write
DF0000
heap
page read and write
C1E000
heap
page read and write
D98000
heap
page read and write
D6F000
heap
page read and write
13B3000
heap
page read and write
DD0000
heap
page read and write
DBC000
heap
page read and write
94C000
heap
page read and write
23DA000
trusted library allocation
page read and write
DE0000
heap
page read and write
1198000
heap
page read and write
C08000
heap
page read and write
964000
heap
page read and write
B6C000
heap
page read and write
DE0000
heap
page read and write
1B14000
heap
page read and write
DBC000
heap
page read and write
B5E000
heap
page read and write
9A9000
heap
page read and write
C28000
heap
page read and write
93B000
heap
page read and write
B74000
heap
page read and write
666F2000
unkown
page read and write
BEC000
heap
page read and write
953000
heap
page read and write
15CA000
heap
page read and write
DF0000
heap
page read and write
1AF5000
heap
page read and write
1943000
heap
page read and write
B49000
heap
page read and write
9C5000
heap
page read and write
DD0000
heap
page read and write
D83000
heap
page read and write
D7C000
heap
page read and write
DF4000
heap
page read and write
9A9000
heap
page read and write
2423000
trusted library allocation
page read and write
1AFD000
heap
page read and write
275C000
heap
page read and write
C2D000
heap
page read and write
1B06000
heap
page read and write
F09000
heap
page read and write
957000
heap
page read and write
928000
heap
page read and write
242A000
trusted library allocation
page read and write
E01000
heap
page read and write
2728000
heap
page read and write
DF0000
heap
page read and write
1AF1000
heap
page read and write
D8B000
heap
page read and write
1B14000
heap
page read and write
1AE5000
heap
page read and write
DE6000
heap
page read and write
66641000
unkown
page execute read
D30000
heap
page read and write
B86000
heap
page read and write
1B06C000
heap
page read and write
C28000
heap
page read and write
1B06000
heap
page read and write
B58000
heap
page read and write
C33000
heap
page read and write
93E000
heap
page read and write
1ABD000
heap
page read and write
DD0000
heap
page read and write
D93000
heap
page read and write
1B2B000
heap
page read and write
DFC000
heap
page read and write
D91000
heap
page read and write
C12000
heap
page read and write
D68000
heap
page read and write
D31000
heap
page read and write
7FF718641000
unkown
page readonly
C2D000
heap
page read and write
C1E000
heap
page read and write
2423000
trusted library allocation
page read and write
1AE4000
heap
page read and write
B49000
heap
page read and write
7FF718640000
unkown
page read and write
15ED000
heap
page read and write
DF4000
heap
page read and write
944000
heap
page read and write
9C5000
heap
page read and write
2423000
trusted library allocation
page read and write
DD0000
heap
page read and write
D2C000
heap
page read and write
DD0000
heap
page read and write
242A000
trusted library allocation
page read and write
947000
heap
page read and write
991000
heap
page read and write
98A000
heap
page read and write
138E000
heap
page read and write
15FD000
heap
page read and write
DF4000
heap
page read and write
B84000
heap
page read and write
D6F000
heap
page read and write
1B1D000
heap
page read and write
23DA000
trusted library allocation
page read and write
D7C000
heap
page read and write
15C5000
heap
page read and write
12F4000
heap
page read and write
B86000
heap
page read and write
D68000
heap
page read and write
2778000
heap
page read and write
23D3000
trusted library allocation
page read and write
DF0000
heap
page read and write
C49000
heap
page read and write
1AE1000
heap
page read and write
66706000
unkown
page readonly
B74000
heap
page read and write
1AED000
heap
page read and write
964000
heap
page read and write
1AE31000
heap
page read and write
B6C000
heap
page read and write
DE5000
heap
page read and write
279F000
heap
page read and write
B58000
heap
page read and write
23DA000
trusted library allocation
page read and write
3A66000
heap
page read and write
D77000
heap
page read and write
1962000
heap
page read and write
1ACCC000
heap
page read and write
1B22000
heap
page read and write
D43000
heap
page read and write
D68000
heap
page read and write
928000
heap
page read and write
E01000
heap
page read and write
DD0000
heap
page read and write
162F000
heap
page read and write
23F2000
trusted library allocation
page read and write
FFA000
heap
page read and write
1AF2C000
heap
page read and write
1606000
heap
page read and write
9A9000
heap
page read and write
DE0000
heap
page read and write
DD0000
heap
page read and write
1272000
heap
page read and write
D4F000
heap
page read and write
DF4000
heap
page read and write
1AE1000
heap
page read and write
1AFD000
heap
page read and write
1B14000
heap
page read and write
D8B000
heap
page read and write
15EE000
heap
page read and write
666FA000
unkown
page readonly
DBC000
heap
page read and write
1AFD000
heap
page read and write
1429000
heap
page read and write
D3C000
heap
page read and write
911000
heap
page read and write
94C000
heap
page read and write
C02000
heap
page read and write
D5F000
heap
page read and write
DCF000
heap
page read and write
1AD2000
heap
page read and write
DE0000
heap
page read and write
DD0000
heap
page read and write
242A000
trusted library allocation
page read and write
BE6000
heap
page read and write
1B2B000
heap
page read and write
DBC000
heap
page read and write
DE0000
heap
page read and write
D83000
heap
page read and write
D83000
heap
page read and write
D98000
heap
page read and write
DE0000
heap
page read and write
DF4000
heap
page read and write
B7C000
heap
page read and write
D77000
heap
page read and write
1A506000
heap
page read and write
1AD7000
heap
page read and write
1D03D000
heap
page read and write
C28000
heap
page read and write
937000
heap
page read and write
D70000
heap
page read and write
9A9000
heap
page read and write
D52000
heap
page read and write
1B06000
heap
page read and write
DFC000
heap
page read and write
D73000
heap
page read and write
C12000
heap
page read and write
B6C000
heap
page read and write
DCB000
heap
page read and write
15EE000
heap
page read and write
BEC000
heap
page read and write
DF0000
heap
page read and write
C90000
heap
page read and write
D7F000
heap
page read and write
1B14000
heap
page read and write
953000
heap
page read and write
7FF71863F000
unkown
page readonly
D73000
heap
page read and write
95D000
heap
page read and write
B63000
heap
page read and write
5F0000
heap
page read and write
1A666000
heap
page read and write
C28000
heap
page read and write
DCF000
heap
page read and write
E01000
heap
page read and write
2442000
trusted library allocation
page read and write
D91000
heap
page read and write
1D087000
heap
page read and write
DCF000
heap
page read and write
279F000
heap
page read and write
DFC000
heap
page read and write
D83000
heap
page read and write
C2D000
heap
page read and write
992000
heap
page read and write
928000
heap
page read and write
1B18000
heap
page read and write
D83000
heap
page read and write
1B14000
heap
page read and write
D98000
heap
page read and write
2797000
heap
page read and write
E01000
heap
page read and write
66640000
unkown
page readonly
1AD90000
heap
page read and write
93B000
heap
page read and write
1606000
heap
page read and write
DAC000
heap
page read and write
DD0000
heap
page read and write
1AF5000
heap
page read and write
DCB000
heap
page read and write
5BC1000
heap
page read and write
D73000
heap
page read and write
E01000
heap
page read and write
DE0000
heap
page read and write
279F000
heap
page read and write
D68000
heap
page read and write
279F000
heap
page read and write
1AE1000
heap
page read and write
274C000
heap
page read and write
DAC000
heap
page read and write
14E2000
heap
page read and write
2423000
trusted library allocation
page read and write
C2D000
heap
page read and write
1ACD000
heap
page read and write
B6C000
heap
page read and write
937000
heap
page read and write
2793000
heap
page read and write
D83000
heap
page read and write
DCB000
heap
page read and write
1790000
heap
page read and write
A9C000
heap
page read and write
DFC000
heap
page read and write
C0E000
heap
page read and write
D06000
heap
page read and write
928000
heap
page read and write
1D112000
heap
page read and write
1AF5000
heap
page read and write
DBC000
heap
page read and write
94B000
heap
page read and write
D68000
heap
page read and write
DAC000
heap
page read and write
B49000
heap
page read and write
DE0000
heap
page read and write
1AE5000
heap
page read and write
29E1000
heap
page read and write
1606000
heap
page read and write
DFC000
heap
page read and write
4BBC000
heap
page read and write
940000
heap
page read and write
DAC000
heap
page read and write
D84000
heap
page read and write
1AE49000
heap
page read and write
E01000
heap
page read and write
278A000
heap
page read and write
B59000
heap
page read and write
15C2000
heap
page read and write
1B14000
heap
page read and write
D68000
heap
page read and write
98A000
heap
page read and write
DCF000
heap
page read and write
DF0000
heap
page read and write
5C7000
heap
page read and write
1AE31000
heap
page read and write
1B22000
heap
page read and write
C1E000
heap
page read and write
D98000
heap
page read and write
C35000
heap
page read and write
C35000
heap
page read and write
2793000
heap
page read and write
DE0000
heap
page read and write
15A4000
heap
page read and write
1B14000
heap
page read and write
D91000
heap
page read and write
C35000
heap
page read and write
1AF8000
heap
page read and write
DCF000
heap
page read and write
D91000
heap
page read and write
16E1000
heap
page read and write
275C000
heap
page read and write
DFC000
heap
page read and write
DE0000
heap
page read and write
C28000
heap
page read and write
D75000
heap
page read and write
5FF000
stack
page read and write
1B165000
heap
page read and write
C41000
heap
page read and write
23D3000
trusted library allocation
page read and write
DD0000
heap
page read and write
1AE5000
heap
page read and write
ADF000
stack
page read and write
C28000
heap
page read and write
DF4000
heap
page read and write
D70000
heap
page read and write
4CC6000
heap
page read and write
D83000
heap
page read and write
B7D000
heap
page read and write
2423000
trusted library allocation
page read and write
1377000
heap
page read and write
BF3000
heap
page read and write
D68000
heap
page read and write
2423000
trusted library allocation
page read and write
DFC000
heap
page read and write
C02000
heap
page read and write
928000
heap
page read and write
B36000
heap
page read and write
D7C000
heap
page read and write
160C000
heap
page read and write
D30000
heap
page read and write
DFC000
heap
page read and write
1A0D000
heap
page read and write
D70000
heap
page read and write
950000
heap
page read and write
15F6000
heap
page read and write
1AEF7000
heap
page read and write
F90000
heap
page read and write
1ACA9000
heap
page read and write
1AEB4000
heap
page read and write
DF0000
heap
page read and write
C03000
heap
page read and write
278A000
heap
page read and write
D74000
heap
page read and write
4C99000
heap
page read and write
FC0000
heap
page read and write
C28000
heap
page read and write
C49000
heap
page read and write
E01000
heap
page read and write
15CA000
heap
page read and write
12C5000
heap
page read and write
1A483000
heap
page read and write
23D3000
trusted library allocation
page read and write
15B4000
heap
page read and write
2FF2000
heap
page read and write
BB0000
heap
page read and write
1B2B000
heap
page read and write
DF0000
heap
page read and write
2798000
heap
page read and write
964000
heap
page read and write
242A000
trusted library allocation
page read and write
B68000
heap
page read and write
7FF000
stack
page read and write
1202000
heap
page read and write
DD0000
heap
page read and write
964000
heap
page read and write
964000
heap
page read and write
D7F000
heap
page read and write
DBC000
heap
page read and write
DE1000
heap
page read and write
1B06000
heap
page read and write
D68000
heap
page read and write
DF0000
heap
page read and write
DE0000
heap
page read and write
1AE1000
heap
page read and write
276E000
heap
page read and write
C28000
heap
page read and write
B6C000
heap
page read and write
1ADD8000
heap
page read and write
1B58000
heap
page read and write
DE0000
heap
page read and write
953000
heap
page read and write
DE5000
heap
page read and write
93B000
heap
page read and write
1AF1000
heap
page read and write
4D0F000
heap
page read and write
23D3000
trusted library allocation
page read and write
C12000
heap
page read and write
1D076000
heap
page read and write
279F000
heap
page read and write
C49000
heap
page read and write
D1D000
heap
page read and write
DD0000
heap
page read and write
66706000
unkown
page readonly
1AE5000
heap
page read and write
160A000
heap
page read and write
D83000
heap
page read and write
1728000
heap
page read and write
279F000
heap
page read and write
29DD000
heap
page read and write
DF0000
heap
page read and write
279F000
heap
page read and write
1D20F000
heap
page read and write
B84000
heap
page read and write
23D3000
trusted library allocation
page read and write
D83000
heap
page read and write
C12000
heap
page read and write
19FB000
heap
page read and write
2793000
heap
page read and write
DCF000
heap
page read and write
DFC000
heap
page read and write
989000
heap
page read and write
D91000
heap
page read and write
DBC000
heap
page read and write
23F2000
trusted library allocation
page read and write
E01000
heap
page read and write
A91000
heap
page read and write
93B000
heap
page read and write
DE6000
heap
page read and write
15D2000
heap
page read and write
1B04000
heap
page read and write
DAC000
heap
page read and write
C03000
heap
page read and write
28E4000
heap
page read and write
1AED000
heap
page read and write
28AE000
heap
page read and write
DBC000
heap
page read and write
1AE1000
heap
page read and write
1AD1000
heap
page read and write
E7E000
heap
page read and write
5FE000
heap
page read and write
C41000
heap
page read and write
1B17000
heap
page read and write
964000
heap
page read and write
964000
heap
page read and write
1B14000
heap
page read and write
DF4000
heap
page read and write
D91000
heap
page read and write
5186000
heap
page read and write
991000
heap
page read and write
DCF000
heap
page read and write
1606000
heap
page read and write
1ACCC000
heap
page read and write
DE0000
heap
page read and write
9A9000
heap
page read and write
94C000
heap
page read and write
DCF000
heap
page read and write
1A35F000
heap
page read and write
B74000
heap
page read and write
1B14000
heap
page read and write
D98000
heap
page read and write
2442000
trusted library allocation
page read and write
DF0000
heap
page read and write
B6C000
heap
page read and write
D98000
heap
page read and write
953000
heap
page read and write
1AD1000
heap
page read and write
928000
heap
page read and write
1A53D000
heap
page read and write
943000
heap
page read and write
276E000
heap
page read and write
C2D000
heap
page read and write
D83000
heap
page read and write
141D000
heap
page read and write
1B13E000
heap
page read and write
DCF000
heap
page read and write
DFC000
heap
page read and write
5B30000
heap
page read and write
DBC000
heap
page read and write
1AF5000
heap
page read and write
1AF5000
heap
page read and write
B49000
heap
page read and write
1B04E000
heap
page read and write
5BB3000
heap
page read and write
93C000
heap
page read and write
DCF000
heap
page read and write
275C000
heap
page read and write
B86000
heap
page read and write
DF4000
heap
page read and write
9C5000
heap
page read and write
370B000
heap
page read and write
B5E000
heap
page read and write
66640000
unkown
page readonly
B49000
heap
page read and write
2A60000
heap
page read and write
937000
heap
page read and write
1AD28000
heap
page read and write
1B14000
heap
page read and write
C42000
heap
page read and write
937000
heap
page read and write
1B127000
heap
page read and write
93B000
heap
page read and write
278A000
heap
page read and write
1357000
heap
page read and write
E01000
heap
page read and write
DBC000
heap
page read and write
2423000
trusted library allocation
page read and write
160A000
heap
page read and write
2442000
trusted library allocation
page read and write
1AFD000
heap
page read and write
DAC000
heap
page read and write
2423000
trusted library allocation
page read and write
938000
heap
page read and write
DBC000
heap
page read and write
2423000
trusted library allocation
page read and write
160C000
heap
page read and write
DD0000
heap
page read and write
D30000
heap
page read and write
D84000
heap
page read and write
2782000
heap
page read and write
1AF1000
heap
page read and write
1AE1000
heap
page read and write
2794000
heap
page read and write
15D1000
heap
page read and write
1AFBD000
heap
page read and write
1B06000
heap
page read and write
DD0000
heap
page read and write
DF0000
heap
page read and write
94C000
heap
page read and write
B5F000
heap
page read and write
1AED000
heap
page read and write
15C2000
heap
page read and write
DE0000
heap
page read and write
1B2B000
heap
page read and write
D6D000
heap
page read and write
1A50000
heap
page read and write
15E2000
heap
page read and write
DE5000
heap
page read and write
1B2B000
heap
page read and write
DF4000
heap
page read and write
D8B000
heap
page read and write
16E8000
heap
page read and write
1606000
heap
page read and write
DE3000
heap
page read and write
B7E000
heap
page read and write
1B181000
heap
page read and write
1AE1000
heap
page read and write
1B14000
heap
page read and write
D31000
heap
page read and write
160C000
heap
page read and write
E01000
heap
page read and write
DE0000
heap
page read and write
DE0000
heap
page read and write
B6C000
heap
page read and write
1B0F7000
heap
page read and write
1B2B000
heap
page read and write
DF0000
heap
page read and write
23F2000
trusted library allocation
page read and write
15FD000
heap
page read and write
D4F000
heap
page read and write
7FF718632000
unkown
page readonly
1AA4000
heap
page read and write
C1E000
heap
page read and write
23C2000
trusted library allocation
page read and write
1B2B000
heap
page read and write
1AFD000
heap
page read and write
D7C000
heap
page read and write
DE6000
heap
page read and write
1ABF000
heap
page read and write
9C5000
heap
page read and write
277E000
heap
page read and write
DBC000
heap
page read and write
D6B000
heap
page read and write
B7E000
heap
page read and write
953000
heap
page read and write
C49000
heap
page read and write
DE0000
heap
page read and write
B60000
heap
page read and write
950000
heap
page read and write
C53000
heap
page read and write
B3D000
heap
page read and write
DE3000
heap
page read and write
B5B000
heap
page read and write
B86000
heap
page read and write
1483000
heap
page read and write
5BAD000
heap
page read and write
1B38000
heap
page read and write
2442000
trusted library allocation
page read and write
D98000
heap
page read and write
3733000
heap
page read and write
DF4000
heap
page read and write
C2D000
heap
page read and write
7FF718610000
unkown
page readonly
275C000
heap
page read and write
DFC000
heap
page read and write
5B57000
heap
page read and write
1AF58000
heap
page read and write
150D000
heap
page read and write
B84000
heap
page read and write
97D000
heap
page read and write
1B18000
heap
page read and write
1B14000
heap
page read and write
1B2B000
heap
page read and write
DAD000
heap
page read and write
1B48000
heap
page read and write
17D1000
heap
page read and write
DAC000
heap
page read and write
1AFD000
heap
page read and write
928000
heap
page read and write
947000
heap
page read and write
1ADA9000
heap
page read and write
D7C000
heap
page read and write
2793000
heap
page read and write
E01000
heap
page read and write
C49000
heap
page read and write
242A000
trusted library allocation
page read and write
B5B000
heap
page read and write
D7C000
heap
page read and write
1502000
heap
page read and write
1AFD000
heap
page read and write
D30000
heap
page read and write
D98000
heap
page read and write
E01000
heap
page read and write
C35000
heap
page read and write
964000
heap
page read and write
1AF8D000
heap
page read and write
D31000
heap
page read and write
D39000
heap
page read and write
953000
heap
page read and write
975000
heap
page read and write
C12000
heap
page read and write
D70000
heap
page read and write
C3A000
heap
page read and write
15ED000
heap
page read and write
928000
heap
page read and write
1AD91000
heap
page read and write
2423000
trusted library allocation
page read and write
C28000
heap
page read and write
29DD000
heap
page read and write
DF4000
heap
page read and write
D0C000
heap
page read and write
26B1000
heap
page read and write
B5E000
heap
page read and write
7FF718610000
unkown
page readonly
B86000
heap
page read and write
666FA000
unkown
page readonly
938000
heap
page read and write
DAD000
heap
page read and write
1A30000
heap
page read and write
BF3000
heap
page read and write
1AD1000
heap
page read and write
1B125000
heap
page read and write
DF0000
heap
page read and write
2442000
trusted library allocation
page read and write
2423000
trusted library allocation
page read and write
1C0000
heap
page read and write
DD0000
heap
page read and write
7FF71863F000
unkown
page readonly
1B2B000
heap
page read and write
E01000
heap
page read and write
1ACDB000
heap
page read and write
957000
heap
page read and write
1921000
heap
page read and write
1B20000
heap
page read and write
1606000
heap
page read and write
C15000
heap
page read and write
DFC000
heap
page read and write
1951000
heap
page read and write
23F2000
trusted library allocation
page read and write
9A9000
heap
page read and write
242A000
trusted library allocation
page read and write
D91000
heap
page read and write
953000
heap
page read and write
DFC000
heap
page read and write
D36000
heap
page read and write
B59000
heap
page read and write
DE5000
heap
page read and write
DD0000
heap
page read and write
79C000
heap
page read and write
15DD000
heap
page read and write
DF0000
heap
page read and write
D83000
heap
page read and write
B74000
heap
page read and write
2793000
heap
page read and write
DFC000
heap
page read and write
1AFD000
heap
page read and write
D98000
heap
page read and write
4CAE000
heap
page read and write
1B06000
heap
page read and write
D8B000
heap
page read and write
DE6000
heap
page read and write
1AE1000
heap
page read and write
1AEE000
heap
page read and write
DCF000
heap
page read and write
B86000
heap
page read and write
DF0000
heap
page read and write
D77000
heap
page read and write
B63000
heap
page read and write
15B5000
heap
page read and write
1AD2000
heap
page read and write
D83000
heap
page read and write
2423000
trusted library allocation
page read and write
94C000
heap
page read and write
15FD000
heap
page read and write
B68000
heap
page read and write
2790000
heap
page read and write
1A666000
heap
page read and write
B68000
heap
page read and write
D84000
heap
page read and write
C2D000
heap
page read and write
D3C000
heap
page read and write
DBC000
heap
page read and write
279A000
heap
page read and write
15B4000
heap
page read and write
14E0000
heap
page read and write
D98000
heap
page read and write
95D000
heap
page read and write
DE0000
heap
page read and write
DF4000
heap
page read and write
D5F000
heap
page read and write
C28000
heap
page read and write
DF0000
heap
page read and write
DF4000
heap
page read and write
E01000
heap
page read and write
7FF718610000
unkown
page readonly
4F14000
heap
page read and write
DCB000
heap
page read and write
1B1A000
heap
page read and write
953000
heap
page read and write
2442000
trusted library allocation
page read and write
23DA000
trusted library allocation
page read and write
E01000
heap
page read and write
12C5000
heap
page read and write
B7E000
heap
page read and write
1B2C000
heap
page read and write
7FF71863D000
unkown
page read and write
B74000
heap
page read and write
98A000
heap
page read and write
1B0C6000
heap
page read and write
14D2000
heap
page read and write
C49000
heap
page read and write
23F2000
trusted library allocation
page read and write
7FF71863D000
unkown
page read and write
1AE1000
heap
page read and write
1AE61000
heap
page read and write
953000
heap
page read and write
1AEF7000
heap
page read and write
D30000
heap
page read and write
9A9000
heap
page read and write
94B000
heap
page read and write
DD0000
heap
page read and write
DCF000
heap
page read and write
E01000
heap
page read and write
1A54D000
heap
page read and write
1AD2000
heap
page read and write
953000
heap
page read and write
DCB000
heap
page read and write
B74000
heap
page read and write
1985000
heap
page read and write
1ACEA000
heap
page read and write
D4F000
heap
page read and write
1B06000
heap
page read and write
D71000
heap
page read and write
160C000
heap
page read and write
15FD000
heap
page read and write
E01000
heap
page read and write
B86000
heap
page read and write
7FF718611000
unkown
page execute read
2758000
heap
page read and write
94C000
heap
page read and write
12B2000
heap
page read and write
E01000
heap
page read and write
AB2000
heap
page read and write
DFC000
heap
page read and write
122B000
heap
page read and write
D83000
heap
page read and write
D91000
heap
page read and write
2783000
heap
page read and write
9A9000
heap
page read and write
278A000
heap
page read and write
1B06000
heap
page read and write
D91000
heap
page read and write
1B0FE000
heap
page read and write
D60000
heap
page read and write
DF4000
heap
page read and write
666F4000
unkown
page write copy
DFC000
heap
page read and write
419000
unkown
page read and write
DAC000
heap
page read and write
E01000
heap
page read and write
1606000
heap
page read and write
93B000
heap
page read and write
1377000
heap
page read and write
928000
heap
page read and write
2928000
heap
page read and write
93C000
heap
page read and write
BAF000
stack
page read and write
B59000
heap
page read and write
DCB000
heap
page read and write
B70000
heap
page read and write
D7C000
heap
page read and write
162F000
heap
page read and write
DF4000
heap
page read and write
9A9000
heap
page read and write
1AFD4000
heap
page read and write
1370000
heap
page read and write
C2D000
heap
page read and write
D7F000
heap
page read and write
C2D000
heap
page read and write
DBC000
heap
page read and write
1B075000
heap
page read and write
DF4000
heap
page read and write
B6C000
heap
page read and write
1377000
heap
page read and write
1B036000
heap
page read and write
DE5000
heap
page read and write
DE3000
heap
page read and write
B49000
heap
page read and write
DD0000
heap
page read and write
D6D000
heap
page read and write
B58000
heap
page read and write
14E0000
heap
page read and write
DE3000
heap
page read and write
1A64D000
heap
page read and write
1B06000
heap
page read and write
D5F000
heap
page read and write
C29000
heap
page read and write
DF0000
heap
page read and write
1AF86000
heap
page read and write
DF4000
heap
page read and write
160A000
heap
page read and write
B7E000
heap
page read and write
D2D000
heap
page read and write
12D9000
heap
page read and write
D98000
heap
page read and write
1AE1000
heap
page read and write
94C000
heap
page read and write
1A97000
heap
page read and write
D68000
heap
page read and write
B8F000
stack
page read and write
D7F000
heap
page read and write
15D5000
heap
page read and write
DBC000
heap
page read and write
B44000
heap
page read and write
D83000
heap
page read and write
947000
heap
page read and write
B31000
heap
page read and write
938000
heap
page read and write
1B0EE000
heap
page read and write
DF4000
heap
page read and write
DBC000
heap
page read and write
D3B000
heap
page read and write
656000
heap
page read and write
D73000
heap
page read and write
DE3000
heap
page read and write
E01000
heap
page read and write
B68000
heap
page read and write
1603000
heap
page read and write
1ACE5000
heap
page read and write
DAC000
heap
page read and write
1B14000
heap
page read and write
7FF71863D000
unkown
page write copy
953000
heap
page read and write
15DE000
heap
page read and write
1AED000
heap
page read and write
D30000
heap
page read and write
DF4000
heap
page read and write
C33000
heap
page read and write
DE6000
heap
page read and write
1B1F000
heap
page read and write
1AC9000
heap
page read and write
947000
heap
page read and write
C2D000
heap
page read and write
E01000
heap
page read and write
4B5F000
heap
page read and write
C49000
heap
page read and write
953000
heap
page read and write
B84000
heap
page read and write
9C5000
heap
page read and write
E01000
heap
page read and write
1AD2000
heap
page read and write
1AE1000
heap
page read and write
DBC000
heap
page read and write
3722000
heap
page read and write
148E000
heap
page read and write
9C5000
heap
page read and write
C28000
heap
page read and write
1AE1000
heap
page read and write
B74000
heap
page read and write
1D06E000
heap
page read and write
2423000
trusted library allocation
page read and write
D6D000
heap
page read and write
1230000
heap
page read and write
9C5000
heap
page read and write
12C5000
heap
page read and write
D7C000
heap
page read and write
94A000
heap
page read and write
2739000
heap
page read and write
1A0000
heap
page read and write
275C000
heap
page read and write
DF0000
heap
page read and write
DE1000
heap
page read and write
DE6000
heap
page read and write
DCB000
heap
page read and write
DCF000
heap
page read and write
8E2000
heap
page read and write
DD0000
heap
page read and write
1AFD000
heap
page read and write
1B18000
heap
page read and write
2423000
trusted library allocation
page read and write
DFC000
heap
page read and write
D30000
heap
page read and write
9A9000
heap
page read and write
1AE60000
heap
page read and write
790000
heap
page read and write
C1D000
heap
page read and write
1B06000
heap
page read and write
947000
heap
page read and write
1B178000
heap
page read and write
D98000
heap
page read and write
C15000
heap
page read and write
15F2000
heap
page read and write
C28000
heap
page read and write
DF0000
heap
page read and write
B5D000
heap
page read and write
15E2000
heap
page read and write
928000
heap
page read and write
1AF1000
heap
page read and write
66702000
unkown
page execute
1AF8A000
heap
page read and write
D6B000
heap
page read and write
D6F000
heap
page read and write
DE6000
heap
page read and write
96F000
heap
page read and write
981000
heap
page read and write
D0E000
heap
page read and write
1B14000
heap
page read and write
C15000
heap
page read and write
D83000
heap
page read and write
1B27000
heap
page read and write
953000
heap
page read and write
2442000
trusted library allocation
page read and write
15EE000
heap
page read and write
1BAC000
heap
page read and write
947000
heap
page read and write
D6B000
heap
page read and write
B86000
heap
page read and write
C28000
heap
page read and write
1AE5000
heap
page read and write
278A000
heap
page read and write
DE6000
heap
page read and write
DAC000
heap
page read and write
C2D000
heap
page read and write
DF4000
heap
page read and write
938000
heap
page read and write
2794000
heap
page read and write
B84000
heap
page read and write
7FF71863F000
unkown
page readonly
DF4000
heap
page read and write
1AE1000
heap
page read and write
DF0000
heap
page read and write
B5B000
heap
page read and write
1AF5000
heap
page read and write
B7E000
heap
page read and write
2442000
trusted library allocation
page read and write
DE6000
heap
page read and write
DBC000
heap
page read and write
2797000
heap
page read and write
B84000
heap
page read and write
D30000
heap
page read and write
C05000
heap
page read and write
DAC000
heap
page read and write
964000
heap
page read and write
DF4000
heap
page read and write
DF0000
heap
page read and write
D98000
heap
page read and write
9A9000
heap
page read and write
DEB000
heap
page read and write
D73000
heap
page read and write
DF4000
heap
page read and write
D6D000
heap
page read and write
B7E000
heap
page read and write
C99000
heap
page read and write
2442000
trusted library allocation
page read and write
9A9000
heap
page read and write
DF4000
heap
page read and write
DAC000
heap
page read and write
1AF2C000
heap
page read and write
DCB000
heap
page read and write
B68000
heap
page read and write
937000
heap
page read and write
953000
heap
page read and write
1D142000
heap
page read and write
DF4000
heap
page read and write
DE6000
heap
page read and write
1AF35000
heap
page read and write
C2D000
heap
page read and write
DAC000
heap
page read and write
B6C000
heap
page read and write
1B48000
heap
page read and write
96B000
heap
page read and write
DAC000
heap
page read and write
1B2B000
heap
page read and write
DE3000
heap
page read and write
DCB000
heap
page read and write
C1E000
heap
page read and write
277E000
heap
page read and write
1B14000
heap
page read and write
DFC000
heap
page read and write
953000
heap
page read and write
DE0000
heap
page read and write
1AD2000
heap
page read and write
DBC000
heap
page read and write
1981000
heap
page read and write
DE5000
heap
page read and write
2978000
heap
page read and write
1B18000
heap
page read and write
15F6000
heap
page read and write
9A9000
heap
page read and write
7FF71863D000
unkown
page write copy
1998000
heap
page read and write
DCB000
heap
page read and write
23DA000
trusted library allocation
page read and write
DD0000
heap
page read and write
D91000
heap
page read and write
D83000
heap
page read and write
DFC000
heap
page read and write
CAC000
heap
page read and write
DCF000
heap
page read and write
92D000
heap
page read and write
964000
heap
page read and write
DAC000
heap
page read and write
D98000
heap
page read and write
1429000
heap
page read and write
1606000
heap
page read and write
E01000
heap
page read and write
D77000
heap
page read and write
D98000
heap
page read and write
92C000
heap
page read and write
14E0000
heap
page read and write
629000
heap
page read and write
D73000
heap
page read and write
1AD2000
heap
page read and write
7FF71863F000
unkown
page readonly
D60000
heap
page read and write
1AF1000
heap
page read and write
1AF17000
heap
page read and write
B86000
heap
page read and write
DBC000
heap
page read and write
E01000
heap
page read and write
D98000
heap
page read and write
237A000
trusted library allocation
page read and write
1ACCC000
heap
page read and write
DFC000
heap
page read and write
160C000
heap
page read and write
964000
heap
page read and write
1AF60000
heap
page read and write
C28000
heap
page read and write
DBC000
heap
page read and write
94C000
heap
page read and write
DAC000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
7FF718640000
unkown
page write copy
D68000
heap
page read and write
1AD2000
heap
page read and write
D50000
heap
page read and write
169D000
heap
page read and write
DF4000
heap
page read and write
DF0000
heap
page read and write
15EE000
heap
page read and write
E01000
heap
page read and write
15ED000
heap
page read and write
26F0000
heap
page read and write
14D2000
heap
page read and write
B74000
heap
page read and write
B5B000
heap
page read and write
AEC000
heap
page read and write
2782000
heap
page read and write
C02000
heap
page read and write
1AD9000
heap
page read and write
B58000
heap
page read and write
1D076000
heap
page read and write
242A000
trusted library allocation
page read and write
23D3000
trusted library allocation
page read and write
15FD000
heap
page read and write
656000
heap
page read and write
DFC000
heap
page read and write
DFC000
heap
page read and write
1AEA000
heap
page read and write
23F2000
trusted library allocation
page read and write
1962000
heap
page read and write
9A9000
heap
page read and write
D6F000
heap
page read and write
B68000
heap
page read and write
7FF71863F000
unkown
page readonly
DEA000
heap
page read and write
1A493000
heap
page read and write
D57000
heap
page read and write
8E0000
heap
page read and write
DBC000
heap
page read and write
DCF000
heap
page read and write
DF0000
heap
page read and write
D31000
heap
page read and write
DAC000
heap
page read and write
1AD2000
heap
page read and write
160A000
heap
page read and write
DAD000
heap
page read and write
187D000
heap
page read and write
66640000
unkown
page readonly
1AFD000
heap
page read and write
2782000
heap
page read and write
1AD2000
heap
page read and write
1AD42000
heap
page read and write
1AF1000
heap
page read and write
2782000
heap
page read and write
DCF000
heap
page read and write
D8D000
heap
page read and write
B86000
heap
page read and write
2442000
trusted library allocation
page read and write
964000
heap
page read and write
DCF000
heap
page read and write
1B12D000
heap
page read and write
B74000
heap
page read and write
B5E000
heap
page read and write
66706000
unkown
page readonly
1B036000
heap
page read and write
D7C000
heap
page read and write
E01000
heap
page read and write
2793000
heap
page read and write
277E000
heap
page read and write
D30000
heap
page read and write
D50000
heap
page read and write
1B14000
heap
page read and write
3FB6000
heap
page read and write
D68000
heap
page read and write
D77000
heap
page read and write
66706000
unkown
page readonly
DF4000
heap
page read and write
9A9000
heap
page read and write
1AE1000
heap
page read and write
DE0000
heap
page read and write
2793000
heap
page read and write
1AE09000
heap
page read and write
928000
heap
page read and write
937000
heap
page read and write
E01000
heap
page read and write
D77000
heap
page read and write
941000
heap
page read and write
2782000
heap
page read and write
DAD000
heap
page read and write
C28000
heap
page read and write
DF0000
heap
page read and write
D83000
heap
page read and write
2423000
trusted library allocation
page read and write
D68000
heap
page read and write
29DD000
heap
page read and write
9C5000
heap
page read and write
1B0FE000
heap
page read and write
D77000
heap
page read and write
979000
heap
page read and write
1B2B000
heap
page read and write
937000
heap
page read and write
DD0000
heap
page read and write
1B48000
heap
page read and write
928000
heap
page read and write
B7E000
heap
page read and write
E01000
heap
page read and write
D68000
heap
page read and write
D91000
heap
page read and write
91F000
heap
page read and write
1B18000
heap
page read and write
C2D000
heap
page read and write
B5E000
heap
page read and write
BB1000
heap
page read and write
7FF718640000
unkown
page read and write
B62000
heap
page read and write
9A9000
heap
page read and write
1AE73000
heap
page read and write
C28000
heap
page read and write
DE5000
heap
page read and write
C07000
heap
page read and write
DD0000
heap
page read and write
2790000
heap
page read and write
160C000
heap
page read and write
86B000
heap
page read and write
92C000
heap
page read and write
D2D000
heap
page read and write
1AFD000
heap
page read and write
DE6000
heap
page read and write
C33000
heap
page read and write
1B1C000
heap
page read and write
1AE73000
heap
page read and write
DAC000
heap
page read and write
242A000
trusted library allocation
page read and write
2783000
heap
page read and write
E01000
heap
page read and write
1614000
heap
page read and write
275C000
heap
page read and write
1AF17000
heap
page read and write
D30000
heap
page read and write
2768000
heap
page read and write
1AE39000
heap
page read and write
1377000
heap
page read and write
E01000
heap
page read and write
92C000
heap
page read and write
B68000
heap
page read and write
276E000
heap
page read and write
D6D000
heap
page read and write
DE5000
heap
page read and write
1CFE6000
heap
page read and write
DE3000
heap
page read and write
937000
heap
page read and write
B58000
heap
page read and write
DD0000
heap
page read and write
1AE1000
heap
page read and write
D7C000
heap
page read and write
C28000
heap
page read and write
DE5000
heap
page read and write
B7E000
heap
page read and write
BA5000
heap
page read and write
7FF71863F000
unkown
page readonly
DAC000
heap
page read and write
DE0000
heap
page read and write
1606000
heap
page read and write
DCF000
heap
page read and write
D7C000
heap
page read and write
91C000
heap
page read and write
4E04000
heap
page read and write
DF0000
heap
page read and write
94B000
heap
page read and write
C2D000
heap
page read and write
C35000
heap
page read and write
DF4000
heap
page read and write
13AE000
heap
page read and write
DF4000
heap
page read and write
953000
heap
page read and write
928000
heap
page read and write
1AF8A000
heap
page read and write
15E1000
heap
page read and write
1503000
heap
page read and write
1ADA000
heap
page read and write
1AF3C000
heap
page read and write
DF4000
heap
page read and write
182E000
heap
page read and write
DE5000
heap
page read and write
D50000
heap
page read and write
DCF000
heap
page read and write
D73000
heap
page read and write
C03000
heap
page read and write
92C000
heap
page read and write
1AFD000
heap
page read and write
11A3000
heap
page read and write
9C5000
heap
page read and write
964000
heap
page read and write
1377000
heap
page read and write
1281000
heap
page read and write
11F8000
heap
page read and write
9C5000
heap
page read and write
D7F000
heap
page read and write
BF0000
heap
page read and write
2423000
trusted library allocation
page read and write
C35000
heap
page read and write
1B06000
heap
page read and write
C28000
heap
page read and write
1D139000
heap
page read and write
277B000
heap
page read and write
B86000
heap
page read and write
94C000
heap
page read and write
1D122000
heap
page read and write
DCF000
heap
page read and write
DAD000
heap
page read and write
1ACB5000
heap
page read and write
D18000
heap
page read and write
B6C000
heap
page read and write
1AC50000
heap
page read and write
DE0000
heap
page read and write
BA0000
heap
page read and write
B5B000
heap
page read and write
E01000
heap
page read and write
2423000
trusted library allocation
page read and write
1B06000
heap
page read and write
B49000
heap
page read and write
DBC000
heap
page read and write
1606000
heap
page read and write
1B14000
heap
page read and write
B6C000
heap
page read and write
B68000
heap
page read and write
DF4000
heap
page read and write
1AD2000
heap
page read and write
DD0000
heap
page read and write
C49000
heap
page read and write
E01000
heap
page read and write
2798000
heap
page read and write
1AC84000
heap
page read and write
C49000
heap
page read and write
938000
heap
page read and write
DD0000
heap
page read and write
279A000
heap
page read and write
DFC000
heap
page read and write
15E2000
heap
page read and write
E01000
heap
page read and write
B7E000
heap
page read and write
D98000
heap
page read and write
D50000
heap
page read and write
B49000
heap
page read and write
279F000
heap
page read and write
B58000
heap
page read and write
1B06000
heap
page read and write
1AE1000
heap
page read and write
964000
heap
page read and write
62B000
heap
page read and write
928000
heap
page read and write
5056000
heap
page read and write
B59000
heap
page read and write
11A5000
heap
page read and write
DE0000
heap
page read and write
928000
heap
page read and write
C49000
heap
page read and write
275F000
heap
page read and write
5C0000
heap
page read and write
1B06000
heap
page read and write
1AD2000
heap
page read and write
E01000
heap
page read and write
1AF15000
heap
page read and write
B6C000
heap
page read and write
D5F000
heap
page read and write
D70000
heap
page read and write
953000
heap
page read and write
1B06000
heap
page read and write
D57000
heap
page read and write
2442000
trusted library allocation
page read and write
B86000
heap
page read and write
E01000
heap
page read and write
26B1000
heap
page read and write
DF0000
heap
page read and write
C02000
heap
page read and write
279F000
heap
page read and write
14C2000
heap
page read and write
7FF71863D000
unkown
page write copy
C33000
heap
page read and write
957000
heap
page read and write
2423000
trusted library allocation
page read and write
D83000
heap
page read and write
B7E000
heap
page read and write
DF0000
heap
page read and write
7FF718632000
unkown
page readonly
D68000
heap
page read and write
2423000
trusted library allocation
page read and write
DEB000
heap
page read and write
D43000
heap
page read and write
DE5000
heap
page read and write
1AF60000
heap
page read and write
D2D000
heap
page read and write
DCB000
heap
page read and write
DF4000
heap
page read and write
D30000
heap
page read and write
1B06000
heap
page read and write
B62000
heap
page read and write
C28000
heap
page read and write
E01000
heap
page read and write
1A6B8000
heap
page read and write
1614000
heap
page read and write
2793000
heap
page read and write
2793000
heap
page read and write
1ABF000
heap
page read and write
1AE4000
heap
page read and write
DCF000
heap
page read and write
160C000
heap
page read and write
C49000
heap
page read and write
D2D000
heap
page read and write
D84000
heap
page read and write
1B0EE000
heap
page read and write
DCF000
heap
page read and write
1AFE2000
heap
page read and write
1AED000
heap
page read and write
E01000
heap
page read and write
DD0000
heap
page read and write
1B14000
heap
page read and write
D8B000
heap
page read and write
D9D000
heap
page read and write
DFC000
heap
page read and write
1AFD000
heap
page read and write
B6C000
heap
page read and write
DF4000
heap
page read and write
D6F000
heap
page read and write
2423000
trusted library allocation
page read and write
2442000
trusted library allocation
page read and write
B58000
heap
page read and write
13C8000
heap
page read and write
E01000
heap
page read and write
1B2B000
heap
page read and write
D7C000
heap
page read and write
C15000
heap
page read and write
C14000
heap
page read and write
D83000
heap
page read and write
DAC000
heap
page read and write
160A000
heap
page read and write
B7E000
heap
page read and write
1ACED000
heap
page read and write
1623000
heap
page read and write
D77000
heap
page read and write
D77000
heap
page read and write
93E000
heap
page read and write
D7F000
heap
page read and write
14E0000
heap
page read and write
1935000
heap
page read and write
C53000
heap
page read and write
DD0000
heap
page read and write
C2D000
heap
page read and write
928000
heap
page read and write
DCF000
heap
page read and write
B7E000
heap
page read and write
DFC000
heap
page read and write
1B06000
heap
page read and write
1AE4000
heap
page read and write
14D2000
heap
page read and write
C03000
heap
page read and write
D98000
heap
page read and write
1AD79000
heap
page read and write
B74000
heap
page read and write
275C000
heap
page read and write
DFC000
heap
page read and write
15ED000
heap
page read and write
157E000
heap
page read and write
1B2B000
heap
page read and write
DE0000
heap
page read and write
94C000
heap
page read and write
DE3000
heap
page read and write
D39000
heap
page read and write
B74000
heap
page read and write
12DD000
heap
page read and write
D50000
heap
page read and write
1AE5000
heap
page read and write
D91000
heap
page read and write
D5F000
heap
page read and write
D84000
heap
page read and write
DE3000
heap
page read and write
950000
heap
page read and write
666F4000
unkown
page write copy
1B18000
heap
page read and write
19B1000
heap
page read and write
B74000
heap
page read and write
1D20F000
heap
page read and write
DE0000
heap
page read and write
E01000
heap
page read and write
1AFD000
heap
page read and write
15F1000
heap
page read and write
1D112000
heap
page read and write
88E000
heap
page read and write
15DE000
heap
page read and write
15D2000
heap
page read and write
D31000
heap
page read and write
D68000
heap
page read and write
1B14000
heap
page read and write
938000
heap
page read and write
DFC000
heap
page read and write
93B000
heap
page read and write
23F2000
trusted library allocation
page read and write
2790000
heap
page read and write
953000
heap
page read and write
23DA000
trusted library allocation
page read and write
2423000
trusted library allocation
page read and write
275C000
heap
page read and write
242A000
trusted library allocation
page read and write
D78000
heap
page read and write
D77000
heap
page read and write
DE6000
heap
page read and write
B49000
heap
page read and write
279A000
heap
page read and write
DE5000
heap
page read and write
94C000
heap
page read and write
95D000
heap
page read and write
1BCD000
heap
page read and write
DCB000
heap
page read and write
C35000
heap
page read and write
DE5000
heap
page read and write
7FF718632000
unkown
page readonly
D85000
heap
page read and write
C35000
heap
page read and write
1606000
heap
page read and write
1B14000
heap
page read and write
1B18000
heap
page read and write
BEC000
heap
page read and write
1B2B000
heap
page read and write
15C8000
heap
page read and write
D4F000
heap
page read and write
C12000
heap
page read and write
7FF718632000
unkown
page readonly
9A9000
heap
page read and write
E01000
heap
page read and write
276E000
heap
page read and write
1B125000
heap
page read and write
D31000
heap
page read and write
1AE5000
heap
page read and write
9C5000
heap
page read and write
D60000
heap
page read and write
C12000
heap
page read and write
D77000
heap
page read and write
1B14000
heap
page read and write
DE1000
heap
page read and write
C49000
heap
page read and write
9C5000
heap
page read and write
276E000
heap
page read and write
B6C000
heap
page read and write
938000
heap
page read and write
B86000
heap
page read and write
1429000
heap
page read and write
94D000
heap
page read and write
279F000
heap
page read and write
96A000
heap
page read and write
D60000
heap
page read and write
15E1000
heap
page read and write
D73000
heap
page read and write
DBC000
heap
page read and write
DAC000
heap
page read and write
DE3000
heap
page read and write
9C5000
heap
page read and write
E01000
heap
page read and write
957000
heap
page read and write
DCF000
heap
page read and write
D98000
heap
page read and write
242A000
trusted library allocation
page read and write
7FF718611000
unkown
page execute read
DCF000
heap
page read and write
B7C000
heap
page read and write
B58000
heap
page read and write
1B06000
heap
page read and write
8C0000
heap
page read and write
1AF15000
heap
page read and write
23DA000
trusted library allocation
page read and write
1AF5000
heap
page read and write
242A000
trusted library allocation
page read and write
1AFD000
heap
page read and write
1B2B000
heap
page read and write
DCF000
heap
page read and write
1AE20000
heap
page read and write
1B38000
heap
page read and write
1AD1000
heap
page read and write
DBC000
heap
page read and write
B86000
heap
page read and write
1D113000
heap
page read and write
1B1C000
heap
page read and write
DAD000
heap
page read and write
14E2000
heap
page read and write
1AED000
heap
page read and write
D98000
heap
page read and write
2423000
trusted library allocation
page read and write
1AD2000
heap
page read and write
1CFE7000
heap
page read and write
C28000
heap
page read and write
15D2000
heap
page read and write
98F000
stack
page read and write
97D000
heap
page read and write
937000
heap
page read and write
BF0000
heap
page read and write
93B000
heap
page read and write
C30000
heap
page read and write
DE2000
heap
page read and write
DCF000
heap
page read and write
BA9000
heap
page read and write
DF4000
heap
page read and write
1377000
heap
page read and write
1612000
heap
page read and write
DF0000
heap
page read and write
B86000
heap
page read and write
7FF718611000
unkown
page execute read
D8B000
heap
page read and write
D7C000
heap
page read and write
953000
heap
page read and write
1D087000
heap
page read and write
D68000
heap
page read and write
D2D000
heap
page read and write
1A52E000
heap
page read and write
14E2000
heap
page read and write
C2D000
heap
page read and write
1AE5000
heap
page read and write
D31000
heap
page read and write
D7C000
heap
page read and write
66641000
unkown
page execute read
C28000
heap
page read and write
B6C000
heap
page read and write
2442000
trusted library allocation
page read and write
2782000
heap
page read and write
C02000
heap
page read and write
2423000
trusted library allocation
page read and write
D83000
heap
page read and write
DF4000
heap
page read and write
D77000
heap
page read and write
5011000
heap
page read and write
DCF000
heap
page read and write
DE6000
heap
page read and write
DE6000
heap
page read and write
DCF000
heap
page read and write
DFC000
heap
page read and write
DD0000
heap
page read and write
B6C000
heap
page read and write
B86000
heap
page read and write
D98000
heap
page read and write
937000
heap
page read and write
D61000
heap
page read and write
666F4000
unkown
page write copy
DCF000
heap
page read and write
DE0000
heap
page read and write
1B19000
heap
page read and write
92C000
heap
page read and write
92C000
heap
page read and write
D98000
heap
page read and write
DAC000
heap
page read and write
C12000
heap
page read and write
DCB000
heap
page read and write
B19000
heap
page read and write
1B1C000
heap
page read and write
E7E000
heap
page read and write
DF0000
heap
page read and write
1B18000
heap
page read and write
DD0000
heap
page read and write
DE1000
heap
page read and write
D83000
heap
page read and write
E01000
heap
page read and write
B84000
heap
page read and write
C28000
heap
page read and write
66640000
unkown
page readonly
DAC000
heap
page read and write
DFC000
heap
page read and write
15E5000
heap
page read and write
B6C000
heap
page read and write
1B39000
heap
page read and write
1D1E9000
heap
page read and write
943000
heap
page read and write
160C000
heap
page read and write
93B000
heap
page read and write
1391000
heap
page read and write
C28000
heap
page read and write
C33000
heap
page read and write
2103000
trusted library allocation
page read and write
E01000
heap
page read and write
666FA000
unkown
page readonly
2794000
heap
page read and write
D70000
heap
page read and write
DE3000
heap
page read and write
1603000
heap
page read and write
1AFD000
heap
page read and write
B58000
heap
page read and write
953000
heap
page read and write
7FF71863D000
unkown
page read and write
1429000
heap
page read and write
DBC000
heap
page read and write
1614000
heap
page read and write
D6D000
heap
page read and write
279D000
heap
page read and write
1AE73000
heap
page read and write
1B14000
heap
page read and write
C28000
heap
page read and write
DE6000
heap
page read and write
791000
heap
page read and write
126F000
heap
page read and write
66702000
unkown
page execute
C16000
heap
page read and write
B6C000
heap
page read and write
C53000
heap
page read and write
1AE2000
heap
page read and write
B84000
heap
page read and write
1B065000
heap
page read and write
DE3000
heap
page read and write
23DA000
trusted library allocation
page read and write
1ABF000
heap
page read and write
B68000
heap
page read and write
DE3000
heap
page read and write
D7C000
heap
page read and write
275F000
heap
page read and write
1ACD000
heap
page read and write
DE0000
heap
page read and write
2A61000
heap
page read and write
1B22000
heap
page read and write
1981000
heap
page read and write
1B0EE000
heap
page read and write
B6C000
heap
page read and write
15FD000
heap
page read and write
1ADC9000
heap
page read and write
945000
heap
page read and write
D93000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
4C61000
heap
page read and write
DCB000
heap
page read and write
242A000
trusted library allocation
page read and write
DE0000
heap
page read and write
DE0000
heap
page read and write
C49000
heap
page read and write
1AE1000
heap
page read and write
964000
heap
page read and write
D98000
heap
page read and write
D78000
heap
page read and write
1AE1000
heap
page read and write
276E000
heap
page read and write
D8B000
heap
page read and write
B59000
heap
page read and write
E01000
heap
page read and write
98A000
heap
page read and write
1630000
heap
page read and write
15C2000
heap
page read and write
E01000
heap
page read and write
DE0000
heap
page read and write
DCF000
heap
page read and write
B74000
heap
page read and write
C49000
heap
page read and write
B7E000
heap
page read and write
1AED000
heap
page read and write
1AE6000
heap
page read and write
2797000
heap
page read and write
183F000
heap
page read and write
DD0000
heap
page read and write
953000
heap
page read and write
928000
heap
page read and write
1951000
heap
page read and write
1A6D0000
heap
page read and write
DEB000
heap
page read and write
C28000
heap
page read and write
B59000
heap
page read and write
C12000
heap
page read and write
95D000
heap
page read and write
DD0000
heap
page read and write
D83000
heap
page read and write
DF4000
heap
page read and write
B86000
heap
page read and write
DBC000
heap
page read and write
92C000
heap
page read and write
B86000
heap
page read and write
E78000
heap
page read and write
947000
heap
page read and write
1ACD000
heap
page read and write
DBC000
heap
page read and write
1B06000
heap
page read and write
275C000
heap
page read and write
D2D000
heap
page read and write
1AE1000
heap
page read and write
DAC000
heap
page read and write
C2D000
heap
page read and write
279F000
heap
page read and write
9A9000
heap
page read and write
4F56000
heap
page read and write
1AC3000
heap
page read and write
C41000
heap
page read and write
D68000
heap
page read and write
B68000
heap
page read and write
94C000
heap
page read and write
953000
heap
page read and write
278A000
heap
page read and write
E01000
heap
page read and write
1AE61000
heap
page read and write
D77000
heap
page read and write
D30000
heap
page read and write
B23000
heap
page read and write
D30000
heap
page read and write
DF0000
heap
page read and write
DBC000
heap
page read and write
B84000
heap
page read and write
B6C000
heap
page read and write
B7E000
heap
page read and write
9A9000
heap
page read and write
D5F000
heap
page read and write
5A0000
heap
page read and write
B7E000
heap
page read and write
D5F000
heap
page read and write
141D000
heap
page read and write
1AD2000
heap
page read and write
DBC000
heap
page read and write
C28000
heap
page read and write
277E000
heap
page read and write
11F6000
heap
page read and write
E01000
heap
page read and write
5C0C000
heap
page read and write
D7C000
heap
page read and write
13D0000
heap
page read and write
1AED000
heap
page read and write
D2D000
heap
page read and write
DF0000
heap
page read and write
C1E000
heap
page read and write
D98000
heap
page read and write
15FD000
heap
page read and write
4E04000
heap
page read and write
D83000
heap
page read and write
1AE1000
heap
page read and write
E01000
heap
page read and write
94C000
heap
page read and write
1B2C000
heap
page read and write
1E0000
heap
page read and write
D7C000
heap
page read and write
1AD1000
heap
page read and write
D3B000
heap
page read and write
1B20000
heap
page read and write
94C000
heap
page read and write
1B1C000
heap
page read and write
C41000
heap
page read and write
C28000
heap
page read and write
C0D000
heap
page read and write
1284000
heap
page read and write
1AFD000
heap
page read and write
1603000
heap
page read and write
1D1A2000
heap
page read and write
1B14000
heap
page read and write
D2D000
heap
page read and write
B49000
heap
page read and write
242A000
trusted library allocation
page read and write
7FF718641000
unkown
page readonly
DE5000
heap
page read and write
1A5C000
heap
page read and write
DFC000
heap
page read and write
DF0000
heap
page read and write
C4D000
heap
page read and write
1B14000
heap
page read and write
D31000
heap
page read and write
964000
heap
page read and write
C49000
heap
page read and write
9A9000
heap
page read and write
1606000
heap
page read and write
1B14000
heap
page read and write
D4F000
heap
page read and write
D68000
heap
page read and write
9C5000
heap
page read and write
D98000
heap
page read and write
B86000
heap
page read and write
D6D000
heap
page read and write
D30000
heap
page read and write
C28000
heap
page read and write
B63000
heap
page read and write
DE5000
heap
page read and write
D8B000
heap
page read and write
1ACCC000
heap
page read and write
1377000
heap
page read and write
B7E000
heap
page read and write
93B000
heap
page read and write
D83000
heap
page read and write
1B58000
heap
page read and write
D98000
heap
page read and write
D68000
heap
page read and write
276E000
heap
page read and write
D6E000
heap
page read and write
2423000
trusted library allocation
page read and write
E01000
heap
page read and write
B59000
heap
page read and write
2797000
heap
page read and write
AA9000
heap
page read and write
D83000
heap
page read and write
1351000
heap
page read and write
1BAA000
heap
page read and write
15D2000
heap
page read and write
B7E000
heap
page read and write
FA6000
heap
page read and write
B5E000
heap
page read and write
D50000
heap
page read and write
DCB000
heap
page read and write
DBC000
heap
page read and write
D6F000
heap
page read and write
C3A000
heap
page read and write
1ACFC000
heap
page read and write
245E000
heap
page read and write
937000
heap
page read and write
E01000
heap
page read and write
1B18000
heap
page read and write
29B4000
heap
page read and write
2423000
trusted library allocation
page read and write
D5F000
heap
page read and write
1B0BE000
heap
page read and write
DE3000
heap
page read and write
C16000
heap
page read and write
7FF718611000
unkown
page execute read
274C000
heap
page read and write
D50000
heap
page read and write
1B06C000
heap
page read and write
E01000
heap
page read and write
B7D000
heap
page read and write
D70000
heap
page read and write
DAD000
heap
page read and write
C28000
heap
page read and write
1AF2C000
heap
page read and write
15EE000
heap
page read and write
997000
heap
page read and write
B7E000
heap
page read and write
279D000
heap
page read and write
D61000
heap
page read and write
DD0000
heap
page read and write
DE0000
heap
page read and write
1AC7C000
heap
page read and write
D4F000
heap
page read and write
2797000
heap
page read and write
C08000
heap
page read and write
D8B000
heap
page read and write
1AD2000
heap
page read and write
7FF718611000
unkown
page execute read
194D000
heap
page read and write
937000
heap
page read and write
C02000
heap
page read and write
928000
heap
page read and write
160A000
heap
page read and write
DFC000
heap
page read and write
E01000
heap
page read and write
D39000
heap
page read and write
DBC000
heap
page read and write
1AE1000
heap
page read and write
1D12A000
heap
page read and write
C1E000
heap
page read and write
2777000
heap
page read and write
93D000
heap
page read and write
DBC000
heap
page read and write
E01000
heap
page read and write
2442000
trusted library allocation
page read and write
15D2000
heap
page read and write
B7D000
heap
page read and write
DAC000
heap
page read and write
26FC000
heap
page read and write
DD0000
heap
page read and write
DF4000
heap
page read and write
B5B000
heap
page read and write
DAC000
heap
page read and write
C41000
heap
page read and write
DEB000
heap
page read and write
DCB000
heap
page read and write
B86000
heap
page read and write
E01000
heap
page read and write
23DA000
trusted library allocation
page read and write
1B04B000
heap
page read and write
1A49B000
heap
page read and write
D35000
heap
page read and write
964000
heap
page read and write
7FF718610000
unkown
page readonly
1B08B000
heap
page read and write
DE3000
heap
page read and write
242A000
trusted library allocation
page read and write
1AD6000
heap
page read and write
D77000
heap
page read and write
1AE1000
heap
page read and write
D5F000
heap
page read and write
86C000
heap
page read and write
992000
heap
page read and write
DE6000
heap
page read and write
DE3000
heap
page read and write
D98000
heap
page read and write
B6C000
heap
page read and write
D7C000
heap
page read and write
CFE000
heap
page read and write
938000
heap
page read and write
DF4000
heap
page read and write
2865000
heap
page read and write
15D5000
heap
page read and write
1281000
heap
page read and write
159C000
heap
page read and write
DE6000
heap
page read and write
1A44000
heap
page read and write
C35000
heap
page read and write
DE0000
heap
page read and write
B4C000
heap
page read and write
2797000
heap
page read and write
981000
heap
page read and write
7FF718611000
unkown
page execute read
C02000
heap
page read and write
1586000
heap
page read and write
E01000
heap
page read and write
DAC000
heap
page read and write
C37000
heap
page read and write
D68000
heap
page read and write
938000
heap
page read and write
DD0000
heap
page read and write
1AF1000
heap
page read and write
1B18000
heap
page read and write
DBC000
heap
page read and write
2423000
trusted library allocation
page read and write
B69000
heap
page read and write
DBC000
heap
page read and write
DE6000
heap
page read and write
15E1000
heap
page read and write
DE0000
heap
page read and write
15E2000
heap
page read and write
953000
heap
page read and write
C33000
heap
page read and write
E01000
heap
page read and write
1B065000
heap
page read and write
D6F000
heap
page read and write
11D2000
heap
page read and write
DFC000
heap
page read and write
1AF5000
heap
page read and write
400000
unkown
page readonly
B68000
heap
page read and write
2793000
heap
page read and write
B5D000
heap
page read and write
277E000
heap
page read and write
964000
heap
page read and write
1B06000
heap
page read and write
D2D000
heap
page read and write
D83000
heap
page read and write
1B231000
heap
page read and write
29E1000
heap
page read and write
C1E000
heap
page read and write
928000
heap
page read and write
160A000
heap
page read and write
E01000
heap
page read and write
15F2000
heap
page read and write
DE0000
heap
page read and write
DD0000
heap
page read and write
1829000
heap
page read and write
1B0EE000
heap
page read and write
1AD81000
heap
page read and write
11A3000
heap
page read and write
242A000
trusted library allocation
page read and write
1B58000
heap
page read and write
DCB000
heap
page read and write
7FF718632000
unkown
page readonly
E01000
heap
page read and write
DD0000
heap
page read and write
1AB8000
heap
page read and write
DBC000
heap
page read and write
66640000
unkown
page readonly
940000
heap
page read and write
1AB8000
heap
page read and write
29E1000
heap
page read and write
12EB000
heap
page read and write
1AE1000
heap
page read and write
B7D000
heap
page read and write
DFC000
heap
page read and write
DE6000
heap
page read and write
1AF1000
heap
page read and write
D7C000
heap
page read and write
1AF1000
heap
page read and write
20B3000
trusted library allocation
page read and write
DBC000
heap
page read and write
DE3000
heap
page read and write
1377000
heap
page read and write
1606000
heap
page read and write
279A000
heap
page read and write
B86000
heap
page read and write
E01000
heap
page read and write
D76000
heap
page read and write
DBC000
heap
page read and write
1AD9000
heap
page read and write
29DD000
heap
page read and write
FFE000
heap
page read and write
29DD000
heap
page read and write
DD0000
heap
page read and write
5C2C000
heap
page read and write
23DA000
trusted library allocation
page read and write
E01000
heap
page read and write
279F000
heap
page read and write
1B016000
heap
page read and write
DCF000
heap
page read and write
1AE5000
heap
page read and write
953000
heap
page read and write
1B06000
heap
page read and write
196D000
heap
page read and write
64A000
heap
page read and write
E01000
heap
page read and write
DD0000
heap
page read and write
91C000
heap
page read and write
E01000
heap
page read and write
D6D000
heap
page read and write
953000
heap
page read and write
E01000
heap
page read and write
1AE1000
heap
page read and write
1B2B000
heap
page read and write
D7F000
heap
page read and write
B84000
heap
page read and write
66702000
unkown
page execute
DAC000
heap
page read and write
2779000
heap
page read and write
DD0000
heap
page read and write
9C5000
heap
page read and write
DCF000
heap
page read and write
B78000
heap
page read and write
2442000
trusted library allocation
page read and write
964000
heap
page read and write
C0E000
heap
page read and write
DF0000
heap
page read and write
DAC000
heap
page read and write
1AD2000
heap
page read and write
1B48000
heap
page read and write
DE3000
heap
page read and write
DCB000
heap
page read and write
16EC000
heap
page read and write
D68000
heap
page read and write
DAC000
heap
page read and write
DE0000
heap
page read and write
C49000
heap
page read and write
9C5000
heap
page read and write
2442000
trusted library allocation
page read and write
DCB000
heap
page read and write
C41000
heap
page read and write
14E0000
heap
page read and write
E01000
heap
page read and write
B74000
heap
page read and write
16EE000
heap
page read and write
949000
heap
page read and write
1B06000
heap
page read and write
DAD000
heap
page read and write
1CFD6000
heap
page read and write
928000
heap
page read and write
1B18000
heap
page read and write
DE6000
heap
page read and write
E01000
heap
page read and write
23F2000
trusted library allocation
page read and write
94C000
heap
page read and write
E01000
heap
page read and write
1901000
heap
page read and write
7FF718641000
unkown
page readonly
1623000
heap
page read and write
DE5000
heap
page read and write
E01000
heap
page read and write
953000
heap
page read and write
2772000
heap
page read and write
13E1000
heap
page read and write
C28000
heap
page read and write
D77000
heap
page read and write
C49000
heap
page read and write
15D1000
heap
page read and write
2442000
trusted library allocation
page read and write
964000
heap
page read and write
DCF000
heap
page read and write
DE0000
heap
page read and write
DFC000
heap
page read and write
1B25000
heap
page read and write
9C5000
heap
page read and write
666F7000
unkown
page read and write
DF0000
heap
page read and write
E01000
heap
page read and write
DFC000
heap
page read and write
95D000
heap
page read and write
1AD2000
heap
page read and write
DF4000
heap
page read and write
B7D000
heap
page read and write
1D122000
heap
page read and write
D6B000
heap
page read and write
D7C000
heap
page read and write
DE0000
heap
page read and write
66641000
unkown
page execute read
DE6000
heap
page read and write
DE6000
heap
page read and write
D84000
heap
page read and write
975000
heap
page read and write
160C000
heap
page read and write
DE6000
heap
page read and write
B58000
heap
page read and write
9A9000
heap
page read and write
1AE6000
heap
page read and write
1D132000
heap
page read and write
1AF4F000
heap
page read and write
279F000
heap
page read and write
1B2B000
heap
page read and write
1377000
heap
page read and write
D98000
heap
page read and write
DE0000
heap
page read and write
AEF000
stack
page read and write
1B2B000
heap
page read and write
1992000
heap
page read and write
DAC000
heap
page read and write
DE5000
heap
page read and write
953000
heap
page read and write
DE0000
heap
page read and write
D57000
heap
page read and write
D50000
heap
page read and write
9A9000
heap
page read and write
279F000
heap
page read and write
C28000
heap
page read and write
1AE5000
heap
page read and write
D7A000
heap
page read and write
94C000
heap
page read and write
C28000
heap
page read and write
DBC000
heap
page read and write
2423000
trusted library allocation
page read and write
DE3000
heap
page read and write
947000
heap
page read and write
E74000
heap
page read and write
DF4000
heap
page read and write
B7D000
heap
page read and write
DD0000
heap
page read and write
C35000
heap
page read and write
E01000
heap
page read and write
1AEC000
heap
page read and write
D50000
heap
page read and write
1AE5000
heap
page read and write
C12000
heap
page read and write
945000
heap
page read and write
1B18000
heap
page read and write
1AF1000
heap
page read and write
15DD000
heap
page read and write
D68000
heap
page read and write
DD0000
heap
page read and write
E01000
heap
page read and write
2875000
heap
page read and write
C12000
heap
page read and write
1CF69000
heap
page read and write
DAC000
heap
page read and write
DD0000
heap
page read and write
DAC000
heap
page read and write
B68000
heap
page read and write
964000
heap
page read and write
E01000
heap
page read and write
DF4000
heap
page read and write
1B2B000
heap
page read and write
E01000
heap
page read and write
1ADA0000
heap
page read and write
D98000
heap
page read and write
242A000
trusted library allocation
page read and write
D83000
heap
page read and write
C03000
heap
page read and write
D91000
heap
page read and write
B86000
heap
page read and write
1257000
heap
page read and write
D36000
heap
page read and write
DFC000
heap
page read and write
DAD000
heap
page read and write
E01000
heap
page read and write
4A81000
heap
page read and write
DBC000
heap
page read and write
DE3000
heap
page read and write
1B181000
heap
page read and write
C02000
heap
page read and write
DE0000
heap
page read and write
4C81000
heap
page read and write
1B04000
heap
page read and write
1B58000
heap
page read and write
1AD2000
heap
page read and write
277E000
heap
page read and write
D7F000
heap
page read and write
979000
heap
page read and write
DAC000
heap
page read and write
23D0000
heap
page read and write
1B2B000
heap
page read and write
1B0FE000
heap
page read and write
BF0000
heap
page read and write
DBC000
heap
page read and write
1606000
heap
page read and write
928000
heap
page read and write
15FD000
heap
page read and write
1AE9000
heap
page read and write
15FD000
heap
page read and write
C33000
heap
page read and write
1AA4000
heap
page read and write
E01000
heap
page read and write
2790000
heap
page read and write
B68000
heap
page read and write
D3B000
heap
page read and write
DE0000
heap
page read and write
7FF718640000
unkown
page write copy
B74000
heap
page read and write
DF0000
heap
page read and write
2442000
trusted library allocation
page read and write
B5D000
heap
page read and write
D7F000
heap
page read and write
D4F000
heap
page read and write
DE3000
heap
page read and write
B4C000
heap
page read and write
DF4000
heap
page read and write
D93000
heap
page read and write
DE6000
heap
page read and write
7FF718640000
unkown
page read and write
E01000
heap
page read and write
D7F000
heap
page read and write
1AE69000
heap
page read and write
C2D000
heap
page read and write
C15000
heap
page read and write
C07000
heap
page read and write
1CFCF000
heap
page read and write
DCB000
heap
page read and write
C49000
heap
page read and write
DCF000
heap
page read and write
1CF58000
heap
page read and write
DF4000
heap
page read and write
DCF000
heap
page read and write
BF3000
heap
page read and write
242A000
trusted library allocation
page read and write
938000
heap
page read and write
1AFD000
heap
page read and write
C49000
heap
page read and write
1377000
heap
page read and write
D30000
heap
page read and write
1B0C6000
heap
page read and write
DD0000
heap
page read and write
D30000
heap
page read and write
D7F000
heap
page read and write
D68000
heap
page read and write
1ACDB000
heap
page read and write
444000
unkown
page readonly
12F0000
heap
page read and write
1AD7000
heap
page read and write
964000
heap
page read and write
18A2A000
heap
page read and write
93F000
heap
page read and write
D2C000
heap
page read and write
12AD000
heap
page read and write
1B165000
heap
page read and write
DAC000
heap
page read and write
DF0000
heap
page read and write
E01000
heap
page read and write
1B2B000
heap
page read and write
2423000
trusted library allocation
page read and write
DF0000
heap
page read and write
DF0000
heap
page read and write
D83000
heap
page read and write
B86000
heap
page read and write
160C000
heap
page read and write
D68000
heap
page read and write
DD0000
heap
page read and write
D30000
heap
page read and write
930000
heap
page read and write
947000
heap
page read and write
1AFD000
heap
page read and write
1ACB1000
heap
page read and write
1AE1000
heap
page read and write
92C000
heap
page read and write
D70000
heap
page read and write
1B2C000
heap
page read and write
7FF718611000
unkown
page execute read
C16000
heap
page read and write
19A5000
heap
page read and write
15C5000
heap
page read and write
1CFC6000
heap
page read and write
279F000
heap
page read and write
DF0000
heap
page read and write
1281000
heap
page read and write
C49000
heap
page read and write
1AF20000
heap
page read and write
1350000
heap
page read and write
D4F000
heap
page read and write
C53000
heap
page read and write
D7F000
heap
page read and write
1AE1000
heap
page read and write
1377000
heap
page read and write
156F000
stack
page read and write
DE0000
heap
page read and write
15FD000
heap
page read and write
B78000
heap
page read and write
1AC6E000
heap
page read and write
D36000
heap
page read and write
1AFB5000
heap
page read and write
1A63E000
heap
page read and write
1AF4F000
heap
page read and write
C2D000
heap
page read and write
15E1000
heap
page read and write
1AC3000
heap
page read and write
DD0000
heap
page read and write
1AD2000
heap
page read and write
1B58000
heap
page read and write
DBC000
heap
page read and write
242A000
trusted library allocation
page read and write
1A546000
heap
page read and write
1ABF000
heap
page read and write
B7E000
heap
page read and write
2A70000
heap
page read and write
9A9000
heap
page read and write
5B62000
heap
page read and write
B86000
heap
page read and write
1B125000
heap
page read and write
7FF71863D000
unkown
page read and write
D93000
heap
page read and write
DBC000
heap
page read and write
D7F000
heap
page read and write
928000
heap
page read and write
1AD2000
heap
page read and write
94C000
heap
page read and write
29DD000
heap
page read and write
C02000
heap
page read and write
279F000
heap
page read and write
D68000
heap
page read and write
964000
heap
page read and write
DFC000
heap
page read and write
DCF000
heap
page read and write
D6D000
heap
page read and write
7FF71863D000
unkown
page write copy
1AB8000
heap
page read and write
DE3000
heap
page read and write
B84000
heap
page read and write
D31000
heap
page read and write
DCF000
heap
page read and write
B74000
heap
page read and write
979000
heap
page read and write
1A90000
heap
page read and write
C2D000
heap
page read and write
1B2B000
heap
page read and write
E01000
heap
page read and write
DFC000
heap
page read and write
1B39000
heap
page read and write
928000
heap
page read and write
1B74000
heap
page read and write
C2D000
heap
page read and write
1D076000
heap
page read and write
23DA000
trusted library allocation
page read and write
D4F000
heap
page read and write
1B06000
heap
page read and write
1AF0000
heap
page read and write
5B6F000
heap
page read and write
D03000
heap
page read and write
1AEAE000
heap
page read and write
64D000
heap
page read and write
C35000
heap
page read and write
964000
heap
page read and write
126F000
heap
page read and write
D5F000
heap
page read and write
1ABC000
heap
page read and write
93D000
heap
page read and write
E01000
heap
page read and write
1AE9000
heap
page read and write
1AED000
heap
page read and write
B6C000
heap
page read and write
C0D000
heap
page read and write
D2C000
heap
page read and write
F7E000
heap
page read and write
DE0000
heap
page read and write
C16000
heap
page read and write
C02000
heap
page read and write
C35000
heap
page read and write
5BEC000
heap
page read and write
D93000
heap
page read and write
DE1000
heap
page read and write
1B06000
heap
page read and write
D98000
heap
page read and write
2423000
trusted library allocation
page read and write
DFC000
heap
page read and write
279F000
heap
page read and write
DAC000
heap
page read and write
1606000
heap
page read and write
D7C000
heap
page read and write
B6C000
heap
page read and write
93B000
heap
page read and write
274C000
heap
page read and write
1B1C000
heap
page read and write
1AED000
heap
page read and write
D98000
heap
page read and write
9C5000
heap
page read and write
B49000
heap
page read and write
15FD000
heap
page read and write
E01000
heap
page read and write
D91000
heap
page read and write
950000
heap
page read and write
DF0000
heap
page read and write
242A000
trusted library allocation
page read and write
1B08B000
heap
page read and write
C16000
heap
page read and write
C35000
heap
page read and write
92C000
heap
page read and write
2790000
heap
page read and write
1B06000
heap
page read and write
C28000
heap
page read and write
953000
heap
page read and write
DE3000
heap
page read and write
C2D000
heap
page read and write
D91000
heap
page read and write
DCF000
heap
page read and write
274C000
heap
page read and write
66702000
unkown
page execute
94C000
heap
page read and write
943000
heap
page read and write
D2D000
heap
page read and write
1B1D000
heap
page read and write
DBC000
heap
page read and write
1AE1000
heap
page read and write
D91000
heap
page read and write
DCB000
heap
page read and write
1498000
heap
page read and write
5C4D000
heap
page read and write
964000
heap
page read and write
E01000
heap
page read and write
1AD4000
heap
page read and write
1ABD000
heap
page read and write
CF4000
heap
page read and write
C35000
heap
page read and write
1981000
heap
page read and write
D93000
heap
page read and write
D8B000
heap
page read and write
DBC000
heap
page read and write
98A000
heap
page read and write
D6F000
heap
page read and write
15E1000
heap
page read and write
DF0000
heap
page read and write
D36000
heap
page read and write
DAC000
heap
page read and write
23DA000
trusted library allocation
page read and write
DBC000
heap
page read and write
D5F000
heap
page read and write
B7E000
heap
page read and write
23DA000
trusted library allocation
page read and write
B74000
heap
page read and write
1AE69000
heap
page read and write
1AE1000
heap
page read and write
DE3000
heap
page read and write
1AF1000
heap
page read and write
D7C000
heap
page read and write
E01000
heap
page read and write
DE0000
heap
page read and write
DAC000
heap
page read and write
E80000
heap
page read and write
DD0000
heap
page read and write
B58000
heap
page read and write
D91000
heap
page read and write
168F000
stack
page read and write
12DF000
heap
page read and write
C28000
heap
page read and write
DE5000
heap
page read and write
DE6000
heap
page read and write
D73000
heap
page read and write
C09000
heap
page read and write
C28000
heap
page read and write
2797000
heap
page read and write
160A000
heap
page read and write
D30000
heap
page read and write
D9D000
heap
page read and write
D31000
heap
page read and write
D73000
heap
page read and write
959000
heap
page read and write
23A3000
trusted library allocation
page read and write
DF0000
heap
page read and write
E01000
heap
page read and write
1D1A2000
heap
page read and write
DF4000
heap
page read and write
AEC000
heap
page read and write
DCB000
heap
page read and write
DF4000
heap
page read and write
D70000
heap
page read and write
D83000
heap
page read and write
B49000
heap
page read and write
DBC000
heap
page read and write
C2D000
heap
page read and write
B49000
heap
page read and write
9A9000
heap
page read and write
DF0000
heap
page read and write
DAC000
heap
page read and write
23DA000
trusted library allocation
page read and write
2442000
trusted library allocation
page read and write
B74000
heap
page read and write
1AFD000
heap
page read and write
D36000
heap
page read and write
D60000
heap
page read and write
D83000
heap
page read and write
279F000
heap
page read and write
DFC000
heap
page read and write
B58000
heap
page read and write
B7D000
heap
page read and write
DCB000
heap
page read and write
242A000
trusted library allocation
page read and write
B86000
heap
page read and write
95D000
heap
page read and write
23DA000
trusted library allocation
page read and write
DE0000
heap
page read and write
DBC000
heap
page read and write
890000
heap
page read and write
D8B000
heap
page read and write
D93000
heap
page read and write
C02000
heap
page read and write
15B4000
heap
page read and write
D7F000
heap
page read and write
DFC000
heap
page read and write
DCF000
heap
page read and write
54D000
stack
page read and write
7FF718640000
unkown
page write copy
DD0000
heap
page read and write
C12000
heap
page read and write
1B1C000
heap
page read and write
B74000
heap
page read and write
1AE6000
heap
page read and write
DFC000
heap
page read and write
D7C000
heap
page read and write
D98000
heap
page read and write
D98000
heap
page read and write
D30000
heap
page read and write
DE6000
heap
page read and write
B5B000
heap
page read and write
DE3000
heap
page read and write
DFC000
heap
page read and write
1B06000
heap
page read and write
2442000
trusted library allocation
page read and write
23D3000
trusted library allocation
page read and write
CF4000
heap
page read and write
94C000
heap
page read and write
279F000
heap
page read and write
FD3000
heap
page read and write
796000
heap
page read and write
9C5000
heap
page read and write
B7E000
heap
page read and write
DBC000
heap
page read and write
DD0000
heap
page read and write
C28000
heap
page read and write
E01000
heap
page read and write
B6C000
heap
page read and write
2423000
trusted library allocation
page read and write
1281000
heap
page read and write
D7C000
heap
page read and write
928000
heap
page read and write
981000
heap
page read and write
15E1000
heap
page read and write
1AFAB000
heap
page read and write
23F2000
trusted library allocation
page read and write
DFC000
heap
page read and write
1AED000
heap
page read and write
1AF5000
heap
page read and write
1AE2000
heap
page read and write
E01000
heap
page read and write
E7E000
heap
page read and write
DFC000
heap
page read and write
2423000
trusted library allocation
page read and write
D77000
heap
page read and write
E01000
heap
page read and write
275C000
heap
page read and write
DE3000
heap
page read and write
160C000
heap
page read and write
DE0000
heap
page read and write
D98000
heap
page read and write
B74000
heap
page read and write
275F000
heap
page read and write
23D3000
trusted library allocation
page read and write
1AED000
heap
page read and write
C49000
heap
page read and write
C33000
heap
page read and write
162F000
heap
page read and write
DF4000
heap
page read and write
2442000
trusted library allocation
page read and write
1281000
heap
page read and write
160A000
heap
page read and write
93B000
heap
page read and write
D83000
heap
page read and write
DF4000
heap
page read and write
DE6000
heap
page read and write
DF4000
heap
page read and write
DAD000
heap
page read and write
1AFFE000
heap
page read and write
242A000
trusted library allocation
page read and write
1AE5000
heap
page read and write
7FF718611000
unkown
page execute read
E01000
heap
page read and write
15DE000
heap
page read and write
160C000
heap
page read and write
E01000
heap
page read and write
1AF15000
heap
page read and write
D84000
heap
page read and write
1AC6D000
heap
page read and write
947000
heap
page read and write
953000
heap
page read and write
1B1C000
heap
page read and write
1962000
heap
page read and write
93D000
heap
page read and write
D31000
heap
page read and write
15D5000
heap
page read and write
9A9000
heap
page read and write
C35000
heap
page read and write
4AE000
heap
page read and write
DE6000
heap
page read and write
966000
heap
page read and write
9C5000
heap
page read and write
C41000
heap
page read and write
981000
heap
page read and write
93D000
heap
page read and write
1AE5000
heap
page read and write
1AE96000
heap
page read and write
15B4000
heap
page read and write
1B06000
heap
page read and write
DE6000
heap
page read and write
1AE2000
heap
page read and write
D20000
heap
page read and write
1A64E000
heap
page read and write
C33000
heap
page read and write
15D2000
heap
page read and write
D6F000
heap
page read and write
C35000
heap
page read and write
DFC000
heap
page read and write
DFC000
heap
page read and write
C28000
heap
page read and write
29E1000
heap
page read and write
23DA000
trusted library allocation
page read and write
1B22000
heap
page read and write
B84000
heap
page read and write
1B06000
heap
page read and write
7FF718640000
unkown
page read and write
DF4000
heap
page read and write
C0A000
heap
page read and write
B84000
heap
page read and write
C2D000
heap
page read and write
E01000
heap
page read and write
B7D000
heap
page read and write
D6F000
heap
page read and write
D8B000
heap
page read and write
7FF718632000
unkown
page readonly
1AC3000
heap
page read and write
B7E000
heap
page read and write
9A9000
heap
page read and write
B58000
heap
page read and write
DFC000
heap
page read and write
E01000
heap
page read and write
1AF5000
heap
page read and write
B58000
heap
page read and write
1AF38000
heap
page read and write
928000
heap
page read and write
B74000
heap
page read and write
DF4000
heap
page read and write
DCF000
heap
page read and write
1A4A2000
heap
page read and write
279F000
heap
page read and write
B6C000
heap
page read and write
E01000
heap
page read and write
B6C000
heap
page read and write
666D1000
unkown
page readonly
9C5000
heap
page read and write
C28000
heap
page read and write
D77000
heap
page read and write
1B14000
heap
page read and write
E01000
heap
page read and write
9A9000
heap
page read and write
DE3000
heap
page read and write
D68000
heap
page read and write
160C000
heap
page read and write
D30000
heap
page read and write
DD0000
heap
page read and write
C35000
heap
page read and write
1AE5000
heap
page read and write
DFC000
heap
page read and write
B6C000
heap
page read and write
DBC000
heap
page read and write
C35000
heap
page read and write
D50000
heap
page read and write
DFC000
heap
page read and write
DF4000
heap
page read and write
D7F000
heap
page read and write
B86000
heap
page read and write
1378000
heap
page read and write
242A000
trusted library allocation
page read and write
E01000
heap
page read and write
964000
heap
page read and write
DBC000
heap
page read and write
C49000
heap
page read and write
DE3000
heap
page read and write
AA3000
heap
page read and write
B58000
heap
page read and write
D7C000
heap
page read and write
F84000
heap
page read and write
9C5000
heap
page read and write
94C000
heap
page read and write
D6B000
heap
page read and write
947000
heap
page read and write
953000
heap
page read and write
1B06000
heap
page read and write
975000
heap
page read and write
2423000
trusted library allocation
page read and write
DD0000
heap
page read and write
1AA4000
heap
page read and write
D6D000
heap
page read and write
1B06000
heap
page read and write
15B6000
heap
page read and write
DF4000
heap
page read and write
2442000
trusted library allocation
page read and write
D2C000
heap
page read and write
D7C000
heap
page read and write
401000
unkown
page execute read
15E7000
heap
page read and write
DCF000
heap
page read and write
B86000
heap
page read and write
964000
heap
page read and write
DBC000
heap
page read and write
2423000
trusted library allocation
page read and write
15FD000
heap
page read and write
277E000
heap
page read and write
242A000
trusted library allocation
page read and write
D98000
heap
page read and write
DD0000
heap
page read and write
947000
heap
page read and write
1AF8D000
heap
page read and write
DF0000
heap
page read and write
DBC000
heap
page read and write
B68000
heap
page read and write
1AED000
heap
page read and write
D79000
heap
page read and write
D77000
heap
page read and write
D5F000
heap
page read and write
DAC000
heap
page read and write
DAC000
heap
page read and write
93B000
heap
page read and write
7FF718632000
unkown
page readonly
DF0000
heap
page read and write
DF0000
heap
page read and write
B6C000
heap
page read and write
242A000
trusted library allocation
page read and write
D98000
heap
page read and write
1B14000
heap
page read and write
D60000
heap
page read and write
DF0000
heap
page read and write
B6C000
heap
page read and write
964000
heap
page read and write
DE3000
heap
page read and write
D50000
heap
page read and write
B86000
heap
page read and write
E01000
heap
page read and write
15EE000
heap
page read and write
C49000
heap
page read and write
1A441000
heap
page read and write
62B000
heap
page read and write
B7E000
heap
page read and write
1AF15000
heap
page read and write
938000
heap
page read and write
7FF718610000
unkown
page readonly
937000
heap
page read and write
D98000
heap
page read and write
C49000
heap
page read and write
B59000
heap
page read and write
DE5000
heap
page read and write
938000
heap
page read and write
B58000
heap
page read and write
9A9000
heap
page read and write
DCF000
heap
page read and write
940000
heap
page read and write
928000
heap
page read and write
DE5000
heap
page read and write
D68000
heap
page read and write
1B2C000
heap
page read and write
1B117000
heap
page read and write
163D000
heap
page read and write
666F7000
unkown
page read and write
94B000
heap
page read and write
D83000
heap
page read and write
1B20000
heap
page read and write
C28000
heap
page read and write
2423000
trusted library allocation
page read and write
23D3000
trusted library allocation
page read and write
1ACB9000
heap
page read and write
B58000
heap
page read and write
DBC000
heap
page read and write
D77000
heap
page read and write
7FF718641000
unkown
page readonly
1B06000
heap
page read and write
1AF75000
heap
page read and write
1699000
heap
page read and write
DFC000
heap
page read and write
5F8000
heap
page read and write
E01000
heap
page read and write
B63000
heap
page read and write
1AF15000
heap
page read and write
D68000
heap
page read and write
947000
heap
page read and write
D5F000
heap
page read and write
1227000
heap
page read and write
DAC000
heap
page read and write
DF4000
heap
page read and write
1AFD000
heap
page read and write
DCF000
heap
page read and write
96A000
heap
page read and write
1AC9C000
heap
page read and write
D7F000
heap
page read and write
93E000
heap
page read and write
D5F000
heap
page read and write
C28000
heap
page read and write
964000
heap
page read and write
BEC000
heap
page read and write
D68000
heap
page read and write
1405000
heap
page read and write
1B38000
heap
page read and write
B6C000
heap
page read and write
7FF71863D000
unkown
page write copy
5B53000
heap
page read and write
7FF718640000
unkown
page write copy
C53000
heap
page read and write
276E000
heap
page read and write
D98000
heap
page read and write
1A68000
heap
page read and write
1AF3C000
heap
page read and write
1B14000
heap
page read and write
E01000
heap
page read and write
DE3000
heap
page read and write
DD0000
heap
page read and write
1AD1000
heap
page read and write
160C000
heap
page read and write
B59000
heap
page read and write
92C000
heap
page read and write
1D1E9000
heap
page read and write
DE6000
heap
page read and write
E8E000
heap
page read and write
D5F000
heap
page read and write
947000
heap
page read and write
DEB000
heap
page read and write
C28000
heap
page read and write
2876000
heap
page read and write
9C5000
heap
page read and write
208A000
trusted library allocation
page read and write
DAC000
heap
page read and write
2793000
heap
page read and write
D2A000
heap
page read and write
2423000
trusted library allocation
page read and write
98A000
heap
page read and write
F7D000
stack
page read and write
15FD000
heap
page read and write
D7F000
stack
page read and write
DF0000
heap
page read and write
96A000
heap
page read and write
9A9000
heap
page read and write
1B06000
heap
page read and write
D73000
heap
page read and write
D70000
heap
page read and write
1B14000
heap
page read and write
1AED000
heap
page read and write
C28000
heap
page read and write
DF4000
heap
page read and write
15C0000
heap
page read and write
1B14000
heap
page read and write
E01000
heap
page read and write
1606000
heap
page read and write
D68000
heap
page read and write
937000
heap
page read and write
1AFC2000
heap
page read and write
2790000
heap
page read and write
1AC65000
heap
page read and write
1B06000
heap
page read and write
B86000
heap
page read and write
928000
heap
page read and write
15F6000
heap
page read and write
1AE6000
heap
page read and write
7FF718611000
unkown
page execute read
DF0000
heap
page read and write
928000
heap
page read and write
1191000
heap
page read and write
B1F000
heap
page read and write
C2D000
heap
page read and write
93E000
heap
page read and write
2442000
trusted library allocation
page read and write
D7C000
heap
page read and write
DE6000
heap
page read and write
D83000
heap
page read and write
B7E000
heap
page read and write
95D000
heap
page read and write
15D2000
heap
page read and write
B68000
heap
page read and write
1AF48000
heap
page read and write
938000
heap
page read and write
1281000
heap
page read and write
1377000
heap
page read and write
964000
heap
page read and write
1AE79000
heap
page read and write
66641000
unkown
page execute read
9A9000
heap
page read and write
1AD2000
heap
page read and write
B86000
heap
page read and write
964000
heap
page read and write
928000
heap
page read and write
2423000
trusted library allocation
page read and write
1206000
heap
page read and write
928000
heap
page read and write
D50000
heap
page read and write
D7C000
heap
page read and write
DBC000
heap
page read and write
D77000
heap
page read and write
1AC9000
heap
page read and write
DBC000
heap
page read and write
C1D000
heap
page read and write
98A000
heap
page read and write
277D000
heap
page read and write
DCF000
heap
page read and write
1AF75000
heap
page read and write
BBC000
heap
page read and write
DCF000
heap
page read and write
2760000
heap
page read and write
928000
heap
page read and write
E01000
heap
page read and write
C03000
heap
page read and write
D30000
heap
page read and write
B59000
heap
page read and write
D7F000
heap
page read and write
DE6000
heap
page read and write
275C000
heap
page read and write
D43000
heap
page read and write
D6B000
heap
page read and write
1AE40000
heap
page read and write
1AF1000
heap
page read and write
873000
heap
page read and write
278A000
heap
page read and write
1423000
heap
page read and write
C35000
heap
page read and write
93E000
heap
page read and write
953000
heap
page read and write
C28000
heap
page read and write
12F2000
heap
page read and write
C03000
heap
page read and write
160C000
heap
page read and write
2423000
trusted library allocation
page read and write
419000
unkown
page write copy
E01000
heap
page read and write
C2D000
heap
page read and write
D68000
heap
page read and write
1AF1000
heap
page read and write
D91000
heap
page read and write
1870000
heap
page read and write
4C29000
heap
page read and write
E01000
heap
page read and write
23D3000
trusted library allocation
page read and write
DE6000
heap
page read and write
B68000
heap
page read and write
1A57F000
heap
page read and write
DF0000
heap
page read and write
1AF15000
heap
page read and write
1CFE6000
heap
page read and write
7FF718611000
unkown
page execute read
943000
heap
page read and write
7FF718632000
unkown
page readonly
D3B000
heap
page read and write
DF0000
heap
page read and write
B58000
heap
page read and write
1A34000
heap
page read and write
23DA000
trusted library allocation
page read and write
93C000
heap
page read and write
DFC000
heap
page read and write
947000
heap
page read and write
DFC000
heap
page read and write
B7C000
heap
page read and write
957000
heap
page read and write
1B1C000
heap
page read and write
15EE000
heap
page read and write
1B06000
heap
page read and write
5C0C000
heap
page read and write
B6C000
heap
page read and write
DF4000
heap
page read and write
2442000
trusted library allocation
page read and write
DE5000
heap
page read and write
160A000
heap
page read and write
D98000
heap
page read and write
B74000
heap
page read and write
1D06E000
heap
page read and write
DE0000
heap
page read and write
1AD2000
heap
page read and write
E01000
heap
page read and write
23D3000
trusted library allocation
page read and write
23F2000
trusted library allocation
page read and write
2731000
heap
page read and write
B74000
heap
page read and write
1606000
heap
page read and write
D6E000
heap
page read and write
DAC000
heap
page read and write
DBC000
heap
page read and write
DBC000
heap
page read and write
1B165000
heap
page read and write
1B0CF000
heap
page read and write
1AFBD000
heap
page read and write
DBC000
heap
page read and write
C28000
heap
page read and write
1AD6000
heap
page read and write
9C5000
heap
page read and write
242A000
trusted library allocation
page read and write
23DA000
trusted library allocation
page read and write
1B18000
heap
page read and write
CA0000
heap
page read and write
1377000
heap
page read and write
C35000
heap
page read and write
B86000
heap
page read and write
C12000
heap
page read and write
D83000
heap
page read and write
E01000
heap
page read and write
D7C000
heap
page read and write
DCB000
heap
page read and write
DF4000
heap
page read and write
D98000
heap
page read and write
DCF000
heap
page read and write
1B2B000
heap
page read and write
964000
heap
page read and write
E01000
heap
page read and write
DE3000
heap
page read and write
C2D000
heap
page read and write
1A655000
heap
page read and write
1AF5000
heap
page read and write
94C000
heap
page read and write
B58000
heap
page read and write
C2D000
heap
page read and write
DCB000
heap
page read and write
1AD2000
heap
page read and write
DE0000
heap
page read and write
3B0000
heap
page read and write
964000
heap
page read and write
1AF60000
heap
page read and write
1B06000
heap
page read and write
1A48000
heap
page read and write
E01000
heap
page read and write
D4F000
heap
page read and write
D38000
heap
page read and write
D84000
heap
page read and write
DF4000
heap
page read and write
299C000
heap
page read and write
B6C000
heap
page read and write
B5D000
heap
page read and write
1614000
heap
page read and write
D6B000
heap
page read and write
DAC000
heap
page read and write
C33000
heap
page read and write
1B1C000
heap
page read and write
93B000
heap
page read and write
D7F000
heap
page read and write
D31000
heap
page read and write
DD0000
heap
page read and write
2442000
trusted library allocation
page read and write
1614000
heap
page read and write
1B12D000
heap
page read and write
C02000
heap
page read and write
2423000
trusted library allocation
page read and write
DD0000
heap
page read and write
1AFA4000
heap
page read and write
23DA000
trusted library allocation
page read and write
9A9000
heap
page read and write
DE0000
heap
page read and write
1B58000
heap
page read and write
953000
heap
page read and write
DCF000
heap
page read and write
1AF1000
heap
page read and write
DFC000
heap
page read and write
B49000
heap
page read and write
E01000
heap
page read and write
D8B000
heap
page read and write
D50000
heap
page read and write
2423000
trusted library allocation
page read and write
1AED7000
heap
page read and write
937000
heap
page read and write
B6C000
heap
page read and write
DE6000
heap
page read and write
DF0000
heap
page read and write
1AE1000
heap
page read and write
666FA000
unkown
page readonly
B68000
heap
page read and write
19B8000
heap
page read and write
B68000
heap
page read and write
C28000
heap
page read and write
D73000
heap
page read and write
B6C000
heap
page read and write
1B2B000
heap
page read and write
2790000
heap
page read and write
7FF718611000
unkown
page execute read
B84000
heap
page read and write
C15000
heap
page read and write
66640000
unkown
page readonly
B6C000
heap
page read and write
DE5000
heap
page read and write
16E0000
heap
page read and write
C16000
heap
page read and write
2875000
heap
page read and write
D6F000
heap
page read and write
1AB8000
heap
page read and write
9C5000
heap
page read and write
DAC000
heap
page read and write
937000
heap
page read and write
1AED000
heap
page read and write
13DE000
heap
page read and write
5C50000
heap
page read and write
1AE5000
heap
page read and write
2423000
trusted library allocation
page read and write
B7E000
heap
page read and write
B74000
heap
page read and write
D93000
heap
page read and write
9A9000
heap
page read and write
C49000
heap
page read and write
1B22000
heap
page read and write
1AE40000
heap
page read and write
666F4000
unkown
page write copy
278A000
heap
page read and write
D91000
heap
page read and write
937000
heap
page read and write
1704000
heap
page read and write
9C5000
heap
page read and write
DF4000
heap
page read and write
DFC000
heap
page read and write
274C000
heap
page read and write
1AD7000
heap
page read and write
DE2000
heap
page read and write
279F000
heap
page read and write
2442000
trusted library allocation
page read and write
B68000
heap
page read and write
964000
heap
page read and write
E01000
heap
page read and write
DCB000
heap
page read and write
DAC000
heap
page read and write
D4F000
heap
page read and write
279A000
heap
page read and write
12C5000
heap
page read and write
D7F000
heap
page read and write
DCF000
heap
page read and write
D30000
heap
page read and write
196D000
heap
page read and write
DAD000
heap
page read and write
DAD000
heap
page read and write
C49000
heap
page read and write
15B0000
heap
page read and write
9A9000
heap
page read and write
1B11E000
heap
page read and write
C2D000
heap
page read and write
242A000
trusted library allocation
page read and write
1B58000
heap
page read and write
DBC000
heap
page read and write
1AA0000
heap
page read and write
1D1CD000
heap
page read and write
DE5000
heap
page read and write
D71000
heap
page read and write
1AD1000
heap
page read and write
66706000
unkown
page readonly
DE0000
heap
page read and write
B58000
heap
page read and write
B1B000
heap
page read and write
B68000
heap
page read and write
D50000
heap
page read and write
C2D000
heap
page read and write
DCF000
heap
page read and write
1AE2000
heap
page read and write
DE6000
heap
page read and write
D31000
heap
page read and write
279F000
heap
page read and write
242A000
trusted library allocation
page read and write
DBC000
heap
page read and write
5B74000
heap
page read and write
B7E000
heap
page read and write
C35000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
7FF718610000
unkown
page readonly
275C000
heap
page read and write
E01000
heap
page read and write
1570000
heap
page read and write
DCF000
heap
page read and write
2797000
heap
page read and write
93E000
heap
page read and write
DFC000
heap
page read and write
B6C000
heap
page read and write
1AD6000
heap
page read and write
1AE1000
heap
page read and write
B58000
heap
page read and write
DE5000
heap
page read and write
DE6000
heap
page read and write
1D162000
heap
page read and write
1709000
heap
page read and write
F7E000
heap
page read and write
B4C000
heap
page read and write
242A000
trusted library allocation
page read and write
23DA000
trusted library allocation
page read and write
2442000
trusted library allocation
page read and write
937000
heap
page read and write
1B11E000
heap
page read and write
1B06000
heap
page read and write
1ACDB000
heap
page read and write
1276000
heap
page read and write
2782000
heap
page read and write
DCB000
heap
page read and write
1B14000
heap
page read and write
2837000
heap
page read and write
242A000
trusted library allocation
page read and write
950000
heap
page read and write
B74000
heap
page read and write
DE6000
heap
page read and write
D83000
heap
page read and write
953000
heap
page read and write
1AD2000
heap
page read and write
1AE69000
heap
page read and write
1B04E000
heap
page read and write
1AD2000
heap
page read and write
D68000
heap
page read and write
DF0000
heap
page read and write
1AC9000
heap
page read and write
953000
heap
page read and write
1B22000
heap
page read and write
DCB000
heap
page read and write
B78000
heap
page read and write
D98000
heap
page read and write
D73000
heap
page read and write
1B0EE000
heap
page read and write
DAC000
heap
page read and write
1A06000
heap
page read and write
1AF60000
heap
page read and write
1AE2E000
heap
page read and write
D4F000
heap
page read and write
1AE1000
heap
page read and write
D98000
heap
page read and write
E01000
heap
page read and write
D77000
heap
page read and write
928000
heap
page read and write
DCF000
heap
page read and write
E01000
heap
page read and write
1A60E000
heap
page read and write
CB2000
heap
page read and write
D93000
heap
page read and write
DF0000
heap
page read and write
1B14000
heap
page read and write
123B000
heap
page read and write
C2D000
heap
page read and write
947000
heap
page read and write
1B18000
heap
page read and write
C2D000
heap
page read and write
B7E000
heap
page read and write
D98000
heap
page read and write
938000
heap
page read and write
1AB8000
heap
page read and write
B59000
heap
page read and write
4A5000
heap
page read and write
1AF38000
heap
page read and write
D73000
heap
page read and write
C49000
heap
page read and write
93C000
heap
page read and write
5B62000
heap
page read and write
93B000
heap
page read and write
DFC000
heap
page read and write
2758000
heap
page read and write
1B2B000
heap
page read and write
DAC000
heap
page read and write
1B1C000
heap
page read and write
D68000
heap
page read and write
15D5000
heap
page read and write
4C7D000
heap
page read and write
2793000
heap
page read and write
C49000
heap
page read and write
C2D000
heap
page read and write
C28000
heap
page read and write
C28000
heap
page read and write
C11000
heap
page read and write
E01000
heap
page read and write
160C000
heap
page read and write
DF4000
heap
page read and write
D93000
heap
page read and write
E01000
heap
page read and write
1260000
heap
page read and write
1979000
heap
page read and write
1AE69000
heap
page read and write
DD0000
heap
page read and write
DF0000
heap
page read and write
FF0000
heap
page read and write
1AE41000
heap
page read and write
DCF000
heap
page read and write
1AE1000
heap
page read and write
D68000
heap
page read and write
1429000
heap
page read and write
DE6000
heap
page read and write
DD0000
heap
page read and write
242A000
trusted library allocation
page read and write
B59000
heap
page read and write
D98000
heap
page read and write
1ACA5000
heap
page read and write
D6F000
heap
page read and write
B59000
heap
page read and write
5C2C000
heap
page read and write
B34000
heap
page read and write
CBF000
heap
page read and write
666F2000
unkown
page read and write
947000
heap
page read and write
B7C000
heap
page read and write
DE5000
heap
page read and write
B1B000
heap
page read and write
1AF1000
heap
page read and write
D60000
heap
page read and write
DBC000
heap
page read and write
D98000
heap
page read and write
23D3000
trusted library allocation
page read and write
1B125000
heap
page read and write
DFC000
heap
page read and write
964000
heap
page read and write
95D000
heap
page read and write
D7F000
heap
page read and write
5BC9000
heap
page read and write
DBC000
heap
page read and write
15DE000
heap
page read and write
C04000
heap
page read and write
1B2B000
heap
page read and write
26BC000
heap
page read and write
15FD000
heap
page read and write
AA0000
heap
page read and write
DD0000
heap
page read and write
B84000
heap
page read and write
DCB000
heap
page read and write
1B05000
heap
page read and write
B49000
heap
page read and write
1ACD000
heap
page read and write
2980000
heap
page read and write
947000
heap
page read and write
13D1000
heap
page read and write
98A000
heap
page read and write
1B2B000
heap
page read and write
B14000
heap
page read and write
1B2C000
heap
page read and write
D4F000
heap
page read and write
DCB000
heap
page read and write
E01000
heap
page read and write
2442000
trusted library allocation
page read and write
C2D000
heap
page read and write
15D2000
heap
page read and write
666D1000
unkown
page readonly
D91000
heap
page read and write
D50000
heap
page read and write
D75000
heap
page read and write
E01000
heap
page read and write
1B48000
heap
page read and write
DE6000
heap
page read and write
E01000
heap
page read and write
160C000
heap
page read and write
DCB000
heap
page read and write
23DA000
trusted library allocation
page read and write
D77000
heap
page read and write
DFC000
heap
page read and write
C49000
heap
page read and write
D7C000
heap
page read and write
928000
heap
page read and write
D83000
heap
page read and write
D83000
heap
page read and write
B68000
heap
page read and write
B74000
heap
page read and write
D83000
heap
page read and write
D7C000
heap
page read and write
1AED000
heap
page read and write
1AFD000
heap
page read and write
C28000
heap
page read and write
DCB000
heap
page read and write
1AE1000
heap
page read and write
1AF1000
heap
page read and write
D68000
heap
page read and write
DE0000
heap
page read and write
C49000
heap
page read and write
242A000
trusted library allocation
page read and write
DAC000
heap
page read and write
94C000
heap
page read and write
B68000
heap
page read and write
D68000
heap
page read and write
DFC000
heap
page read and write
DCB000
heap
page read and write
1B182000
heap
page read and write
D30000
heap
page read and write
DFC000
heap
page read and write
2790000
heap
page read and write
DFC000
heap
page read and write
C10000
heap
page read and write
DFC000
heap
page read and write
C28000
heap
page read and write
1AEC000
heap
page read and write
D70000
heap
page read and write
D31000
heap
page read and write
242A000
trusted library allocation
page read and write
15E7000
heap
page read and write
2423000
trusted library allocation
page read and write
1D04C000
heap
page read and write
1D076000
heap
page read and write
D2C000
heap
page read and write
1A441000
heap
page read and write
DCF000
heap
page read and write
3049000
heap
page read and write
DF0000
heap
page read and write
1D132000
heap
page read and write
1B181000
heap
page read and write
1603000
heap
page read and write
1AF38000
heap
page read and write
15FD000
heap
page read and write
DE5000
heap
page read and write
1D034000
heap
page read and write
DFC000
heap
page read and write
279F000
heap
page read and write
DCB000
heap
page read and write
C1C000
heap
page read and write
B49000
heap
page read and write
D8B000
heap
page read and write
FAC000
stack
page read and write
279F000
heap
page read and write
93B000
heap
page read and write
2423000
trusted library allocation
page read and write
937000
heap
page read and write
D91000
heap
page read and write
162F000
heap
page read and write
C33000
heap
page read and write
DE6000
heap
page read and write
9A9000
heap
page read and write
9C5000
heap
page read and write
981000
heap
page read and write
1838000
heap
page read and write
DBC000
heap
page read and write
DD0000
heap
page read and write
1B18000
heap
page read and write
94C000
heap
page read and write
DCB000
heap
page read and write
DFC000
heap
page read and write
E01000
heap
page read and write
DE0000
heap
page read and write
66641000
unkown
page execute read
B67000
heap
page read and write
1ACD000
heap
page read and write
DCF000
heap
page read and write
DF4000
heap
page read and write
928000
heap
page read and write
D98000
heap
page read and write
B5E000
heap
page read and write
1B14000
heap
page read and write
279A000
heap
page read and write
7FF71863F000
unkown
page readonly
242A000
trusted library allocation
page read and write
14DB000
heap
page read and write
DAC000
heap
page read and write
2442000
trusted library allocation
page read and write
94B000
heap
page read and write
964000
heap
page read and write
1AF5000
heap
page read and write
C28000
heap
page read and write
BF3000
heap
page read and write
D84000
heap
page read and write
D7F000
heap
page read and write
DAC000
heap
page read and write
C15000
heap
page read and write
D67000
heap
page read and write
B74000
heap
page read and write
163D000
heap
page read and write
957000
heap
page read and write
B3D000
heap
page read and write
1B06000
heap
page read and write
B84000
heap
page read and write
DE0000
heap
page read and write
D0D000
heap
page read and write
DE0000
heap
page read and write
B86000
heap
page read and write
964000
heap
page read and write
DE3000
heap
page read and write
1B14000
heap
page read and write
91C000
heap
page read and write
DBC000
heap
page read and write
D7F000
heap
page read and write
E01000
heap
page read and write
98A000
heap
page read and write
B18000
heap
page read and write
1ACCC000
heap
page read and write
D70000
heap
page read and write
401000
unkown
page execute read
D77000
heap
page read and write
23D3000
trusted library allocation
page read and write
E01000
heap
page read and write
953000
heap
page read and write
DF0000
heap
page read and write
95D000
heap
page read and write
274C000
heap
page read and write
1B06000
heap
page read and write
242A000
trusted library allocation
page read and write
7FF71863D000
unkown
page read and write
B62000
heap
page read and write
937000
heap
page read and write
B86000
heap
page read and write
D7C000
heap
page read and write
2790000
heap
page read and write
D6F000
heap
page read and write
1B06000
heap
page read and write
1AD1000
heap
page read and write
D6B000
heap
page read and write
1979000
heap
page read and write
DF0000
heap
page read and write
D7F000
heap
page read and write
2423000
trusted library allocation
page read and write
1989000
heap
page read and write
DC1000
heap
page read and write
12C5000
heap
page read and write
277B000
heap
page read and write
DFC000
heap
page read and write
DAC000
heap
page read and write
1AD9000
heap
page read and write
23F2000
trusted library allocation
page read and write
1B2B000
heap
page read and write
23D3000
trusted library allocation
page read and write
DE6000
heap
page read and write
7FF718611000
unkown
page execute read
2770000
heap
page read and write
15FD000
heap
page read and write
1AEC000
heap
page read and write
2423000
trusted library allocation
page read and write
937000
heap
page read and write
93B000
heap
page read and write
DF0000
heap
page read and write
DCF000
heap
page read and write
D98000
heap
page read and write
1985000
heap
page read and write
DF4000
heap
page read and write
2442000
trusted library allocation
page read and write
B74000
heap
page read and write
1AFD000
heap
page read and write
23F2000
trusted library allocation
page read and write
15DE000
heap
page read and write
DE1000
heap
page read and write
93C000
heap
page read and write
DD0000
heap
page read and write
D68000
heap
page read and write
1AD4000
heap
page read and write
DCF000
heap
page read and write
2A2E000
heap
page read and write
DE3000
heap
page read and write
94B000
heap
page read and write
1ACD000
heap
page read and write
1ADC8000
heap
page read and write
275F000
heap
page read and write
D93000
heap
page read and write
D5F000
heap
page read and write
DE6000
heap
page read and write
23D3000
trusted library allocation
page read and write
B49000
heap
page read and write
DE0000
heap
page read and write
242A000
trusted library allocation
page read and write
C49000
heap
page read and write
1606000
heap
page read and write
15C3000
heap
page read and write
DCF000
heap
page read and write
B86000
heap
page read and write
E01000
heap
page read and write
B6C000
heap
page read and write
9C5000
heap
page read and write
14D2000
heap
page read and write
1AE59000
heap
page read and write
D7F000
heap
page read and write
B6C000
heap
page read and write
D60000
heap
page read and write
1D11A000
heap
page read and write
953000
heap
page read and write
23DA000
trusted library allocation
page read and write
B84000
heap
page read and write
278A000
heap
page read and write
D91000
heap
page read and write
E01000
heap
page read and write
1A4DE000
heap
page read and write
DCF000
heap
page read and write
B7E000
heap
page read and write
2442000
trusted library allocation
page read and write
B59000
heap
page read and write
D91000
heap
page read and write
937000
heap
page read and write
1AF1000
heap
page read and write
D31000
heap
page read and write
E01000
heap
page read and write
DAC000
heap
page read and write
666FA000
unkown
page readonly
4EC1000
heap
page read and write
1466000
heap
page read and write
DCB000
heap
page read and write
DE0000
heap
page read and write
1AFD000
heap
page read and write
507E000
heap
page read and write
E01000
heap
page read and write
160C000
heap
page read and write
1AD7000
heap
page read and write
A90000
heap
page read and write
BD7000
heap
page read and write
276E000
heap
page read and write
DF4000
heap
page read and write
DF0000
heap
page read and write
DD0000
heap
page read and write
938000
heap
page read and write
DAC000
heap
page read and write
1B14000
heap
page read and write
15BD000
heap
page read and write
29DD000
heap
page read and write
2459000
heap
page read and write
DE0000
heap
page read and write
1B58000
heap
page read and write
1B12D000
heap
page read and write
DCB000
heap
page read and write
1B14000
heap
page read and write
B0C000
heap
page read and write
DCF000
heap
page read and write
146F000
heap
page read and write
DE0000
heap
page read and write
C02000
heap
page read and write
D91000
heap
page read and write
1AFD4000
heap
page read and write
C49000
heap
page read and write
DE0000
heap
page read and write
1AFD000
heap
page read and write
B58000
heap
page read and write
1AE1000
heap
page read and write
15B4000
heap
page read and write
C12000
heap
page read and write
2423000
trusted library allocation
page read and write
DAC000
heap
page read and write
1C045000
heap
page read and write
C2D000
heap
page read and write
DE3000
heap
page read and write
D15000
heap
page read and write
1B06000
heap
page read and write
B58000
heap
page read and write
2423000
trusted library allocation
page read and write
1AF1000
heap
page read and write
DE0000
heap
page read and write
17EF000
stack
page read and write
94C000
heap
page read and write
D60000
heap
page read and write
DD0000
heap
page read and write
DD0000
heap
page read and write
2423000
trusted library allocation
page read and write
29DD000
heap
page read and write
160A000
heap
page read and write
D68000
heap
page read and write
2A0D000
heap
page read and write
86B000
heap
page read and write
1AE86000
heap
page read and write
1AF5000
heap
page read and write
C49000
heap
page read and write
C35000
heap
page read and write
B5E000
heap
page read and write
1AC9000
heap
page read and write
1AF1000
heap
page read and write
242A000
trusted library allocation
page read and write
1B58000
heap
page read and write
12AD000
heap
page read and write
C2D000
heap
page read and write
C2D000
heap
page read and write
DAF000
stack
page read and write
B7E000
heap
page read and write
D98000
heap
page read and write
D68000
heap
page read and write
66641000
unkown
page execute read
C49000
heap
page read and write
12C5000
heap
page read and write
D84000
heap
page read and write
1695000
heap
page read and write
C2D000
heap
page read and write
D30000
heap
page read and write
160C000
heap
page read and write
1AD0E000
heap
page read and write
B58000
heap
page read and write
C35000
heap
page read and write
DE3000
heap
page read and write
15C2000
heap
page read and write
DF0000
heap
page read and write
D91000
heap
page read and write
947000
heap
page read and write
C33000
heap
page read and write
1AE2000
heap
page read and write
C35000
heap
page read and write
5C80000
heap
page read and write
937000
heap
page read and write
2794000
heap
page read and write
DBC000
heap
page read and write
D71000
heap
page read and write
D31000
heap
page read and write
D73000
heap
page read and write
9C5000
heap
page read and write
BE7000
heap
page read and write
1B14000
heap
page read and write
E01000
heap
page read and write
C9B000
heap
page read and write
B68000
heap
page read and write
15F1000
heap
page read and write
B36000
heap
page read and write
DE6000
heap
page read and write
1AFE2000
heap
page read and write
D91000
heap
page read and write
D98000
heap
page read and write
9C5000
heap
page read and write
1AC3000
heap
page read and write
15D1000
heap
page read and write
1B2B000
heap
page read and write
D31000
heap
page read and write
CF6000
heap
page read and write
1ABF000
heap
page read and write
1AF2000
heap
page read and write
B4C000
heap
page read and write
15FF000
heap
page read and write
1AF5000
heap
page read and write
C35000
heap
page read and write
1AFBD000
heap
page read and write
1AED000
heap
page read and write
2782000
heap
page read and write
1AA4000
heap
page read and write
C28000
heap
page read and write
2423000
trusted library allocation
page read and write
2423000
trusted library allocation
page read and write
DAC000
heap
page read and write
276E000
heap
page read and write
C28000
heap
page read and write
B68000
heap
page read and write
E01000
heap
page read and write
DE3000
heap
page read and write
DCB000
heap
page read and write
1B165000
heap
page read and write
E01000
heap
page read and write
B4D000
heap
page read and write
C49000
heap
page read and write
1ACDD000
heap
page read and write
C28000
heap
page read and write
883000
heap
page read and write
1AE1000
heap
page read and write
242A000
trusted library allocation
page read and write
D30000
heap
page read and write
2775000
heap
page read and write
9A9000
heap
page read and write
DCF000
heap
page read and write
1ADC8000
heap
page read and write
1AED6000
heap
page read and write
B6C000
heap
page read and write
9C5000
heap
page read and write
D4B000
heap
page read and write
E01000
heap
page read and write
938000
heap
page read and write
1D04C000
heap
page read and write
BA8000
heap
page read and write
C28000
heap
page read and write
9A9000
heap
page read and write
D30000
heap
page read and write
DE3000
heap
page read and write
1AD0C000
heap
page read and write
D98000
heap
page read and write
2442000
trusted library allocation
page read and write
1B06000
heap
page read and write
C3D000
heap
page read and write
D98000
heap
page read and write
DE0000
heap
page read and write
1AFD000
heap
page read and write
1AF5000
heap
page read and write
D50000
heap
page read and write
1B14000
heap
page read and write
D6A000
heap
page read and write
DF0000
heap
page read and write
DCF000
heap
page read and write
93D000
heap
page read and write
242A000
trusted library allocation
page read and write
928000
heap
page read and write
D98000
heap
page read and write
1AF5000
heap
page read and write
964000
heap
page read and write
1AFD4000
heap
page read and write
DFC000
heap
page read and write
D5F000
heap
page read and write
5CA000
heap
page read and write
1423000
heap
page read and write
DCF000
heap
page read and write
B78000
heap
page read and write
C41000
heap
page read and write
1377000
heap
page read and write
DCF000
heap
page read and write
98A000
heap
page read and write
B6C000
heap
page read and write
D31000
heap
page read and write
D2D000
heap
page read and write
242A000
trusted library allocation
page read and write
B7C000
heap
page read and write
1AE40000
heap
page read and write
1AD2000
heap
page read and write
BC3000
heap
page read and write
C2D000
heap
page read and write
B0F000
stack
page read and write
C02000
heap
page read and write
23D3000
trusted library allocation
page read and write
242A000
trusted library allocation
page read and write
DE6000
heap
page read and write
DF4000
heap
page read and write
B74000
heap
page read and write
DF0000
heap
page read and write
15BF000
heap
page read and write
D70000
heap
page read and write
C37000
heap
page read and write
97D000
heap
page read and write
DD0000
heap
page read and write
DD0000
heap
page read and write
E01000
heap
page read and write
DF0000
heap
page read and write
E01000
heap
page read and write
2423000
trusted library allocation
page read and write
1898000
heap
page read and write
96B000
heap
page read and write
964000
heap
page read and write
7FF71863F000
unkown
page readonly
1B1F000
heap
page read and write
D60000
heap
page read and write
928000
heap
page read and write
1AF15000
heap
page read and write
D70000
heap
page read and write
953000
heap
page read and write
D73000
heap
page read and write
D57000
heap
page read and write
B6C000
heap
page read and write
1AE2000
heap
page read and write
928000
heap
page read and write
9C5000
heap
page read and write
15F6000
heap
page read and write
B49000
heap
page read and write
15F7000
heap
page read and write
B6C000
heap
page read and write
C35000
heap
page read and write
992000
heap
page read and write
DF0000
heap
page read and write
1B0C6000
heap
page read and write
B6C000
heap
page read and write
C28000
heap
page read and write
2790000
heap
page read and write
15DD000
heap
page read and write
95D000
heap
page read and write
D91000
heap
page read and write
1B30000
heap
page read and write
1B2B000
heap
page read and write
1606000
heap
page read and write
1B06000
heap
page read and write
C35000
heap
page read and write
1B06000
heap
page read and write
1B48000
heap
page read and write
C51000
heap
page read and write
7FF718611000
unkown
page execute read
2793000
heap
page read and write
DBC000
heap
page read and write
277D000
heap
page read and write
E01000
heap
page read and write
B68000
heap
page read and write
1B20000
heap
page read and write
D77000
heap
page read and write
E01000
heap
page read and write
C35000
heap
page read and write
1ADC000
heap
page read and write
C0F000
stack
page read and write
C35000
heap
page read and write
1AFD000
heap
page read and write
16AE000
heap
page read and write
B49000
heap
page read and write
DF4000
heap
page read and write
DF0000
heap
page read and write
9A9000
heap
page read and write
928000
heap
page read and write
1614000
heap
page read and write
1A0B000
heap
page read and write
66702000
unkown
page execute
DFC000
heap
page read and write
D98000
heap
page read and write
1B14000
heap
page read and write
1AC9000
heap
page read and write
160C000
heap
page read and write
D39000
heap
page read and write
C2D000
heap
page read and write
5C50000
heap
page read and write
1AF75000
heap
page read and write
D98000
heap
page read and write
DE1000
heap
page read and write
979000
heap
page read and write
DE0000
heap
page read and write
94C000
heap
page read and write
1B2B000
heap
page read and write
D98000
heap
page read and write
964000
heap
page read and write
947000
heap
page read and write
DD0000
heap
page read and write
1B17000
heap
page read and write
1AC3000
heap
page read and write
E01000
heap
page read and write
29E1000
heap
page read and write
E01000
heap
page read and write
1AFD000
heap
page read and write
D68000
heap
page read and write
2442000
trusted library allocation
page read and write
DE5000
heap
page read and write
938000
heap
page read and write
DE0000
heap
page read and write
C33000
heap
page read and write
12C5000
heap
page read and write
B68000
heap
page read and write
DBC000
heap
page read and write
DCF000
heap
page read and write
7FF718610000
unkown
page readonly
DFC000
heap
page read and write
D7C000
heap
page read and write
938000
heap
page read and write
991000
heap
page read and write
95D000
heap
page read and write
D83000
heap
page read and write
29DD000
heap
page read and write
C33000
heap
page read and write
964000
heap
page read and write
91F000
heap
page read and write
C33000
heap
page read and write
C16000
heap
page read and write
94C000
heap
page read and write
1234000
heap
page read and write
928000
heap
page read and write
1AE1000
heap
page read and write
C49000
heap
page read and write
B7E000
heap
page read and write
B6C000
heap
page read and write
23DA000
trusted library allocation
page read and write
14AF000
heap
page read and write
B7D000
heap
page read and write
1ADB000
heap
page read and write
C2D000
heap
page read and write
666F4000
unkown
page write copy
1AE8000
heap
page read and write
DE3000
heap
page read and write
B58000
heap
page read and write
BEC000
heap
page read and write
2797000
heap
page read and write
928000
heap
page read and write
B74000
heap
page read and write
B74000
heap
page read and write
29DD000
heap
page read and write
2423000
trusted library allocation
page read and write
937000
heap
page read and write
DD0000
heap
page read and write
1B06000
heap
page read and write
DE3000
heap
page read and write
2442000
trusted library allocation
page read and write
1AD1000
heap
page read and write
DE2000
heap
page read and write
C3A000
heap
page read and write
2423000
trusted library allocation
page read and write
C11000
heap
page read and write
C1E000
heap
page read and write
1AE1000
heap
page read and write
B7E000
heap
page read and write
DE5000
heap
page read and write
DBC000
heap
page read and write
1AD2000
heap
page read and write
DCF000
heap
page read and write
1B2B000
heap
page read and write
DE3000
heap
page read and write
2442000
trusted library allocation
page read and write
1AC95000
heap
page read and write
D4F000
heap
page read and write
DAC000
heap
page read and write
DF0000
heap
page read and write
1B14000
heap
page read and write
666FA000
unkown
page readonly
279F000
heap
page read and write
DE0000
heap
page read and write
D9D000
heap
page read and write
2423000
trusted library allocation
page read and write
666F2000
unkown
page read and write
1AFD000
heap
page read and write
C01000
heap
page read and write
D70000
heap
page read and write
606000
heap
page read and write
DAC000
heap
page read and write
1D1E9000
heap
page read and write
C2D000
heap
page read and write
1AF8A000
heap
page read and write
1AFD000
heap
page read and write
947000
heap
page read and write
1AF5000
heap
page read and write
14E0000
heap
page read and write
16E9000
heap
page read and write
9C5000
heap
page read and write
1606000
heap
page read and write
1AF5000
heap
page read and write
D9D000
heap
page read and write
B59000
heap
page read and write
15FD000
heap
page read and write
1AD2000
heap
page read and write
2423000
trusted library allocation
page read and write
278A000
heap
page read and write
DF4000
heap
page read and write
371A000
heap
page read and write
938000
heap
page read and write
DF4000
heap
page read and write
B68000
heap
page read and write
DAD000
heap
page read and write
2793000
heap
page read and write
997000
heap
page read and write
7FF71863F000
unkown
page readonly
C12000
heap
page read and write
DBC000
heap
page read and write
1B17000
heap
page read and write
B5E000
heap
page read and write
D83000
heap
page read and write
9A9000
heap
page read and write
1AD2000
heap
page read and write
1B06000
heap
page read and write
C28000
heap
page read and write
160C000
heap
page read and write
DFC000
heap
page read and write
2A02000
heap
page read and write
B6C000
heap
page read and write
940000
heap
page read and write
1B58000
heap
page read and write
B58000
heap
page read and write
DCF000
heap
page read and write
B78000
heap
page read and write
1B38000
heap
page read and write
1D076000
heap
page read and write
B7D000
heap
page read and write
DF0000
heap
page read and write
958000
heap
page read and write
E01000
heap
page read and write
23F2000
trusted library allocation
page read and write
1AED000
heap
page read and write
D68000
heap
page read and write
1D1E9000
heap
page read and write
13D2000
heap
page read and write
D77000
heap
page read and write
1A450000
heap
page read and write
1190000
heap
page read and write
5AC000
stack
page read and write
1AE1000
heap
page read and write
D98000
heap
page read and write
1610000
heap
page read and write
1438000
heap
page read and write
D98000
heap
page read and write
D3B000
heap
page read and write
1D034000
heap
page read and write
DF0000
heap
page read and write
B74000
heap
page read and write
DE3000
heap
page read and write
DBC000
heap
page read and write
D98000
heap
page read and write
D98000
heap
page read and write
1281000
heap
page read and write
C2D000
heap
page read and write
C49000
heap
page read and write
D30000
heap
page read and write
1275000
heap
page read and write
DF0000
heap
page read and write
D7C000
heap
page read and write
1B14000
heap
page read and write
66702000
unkown
page execute
E01000
heap
page read and write
964000
heap
page read and write
D77000
heap
page read and write
2423000
trusted library allocation
page read and write
E01000
heap
page read and write
DAC000
heap
page read and write
242A000
trusted library allocation
page read and write
1B2B000
heap
page read and write
DBC000
heap
page read and write
DCB000
heap
page read and write
C2D000
heap
page read and write
BF3000
heap
page read and write
DCB000
heap
page read and write
123F000
heap
page read and write
1D06E000
heap
page read and write
1B14000
heap
page read and write
1AE11000
heap
page read and write
1AF8D000
heap
page read and write
957000
heap
page read and write
DF4000
heap
page read and write
D31000
heap
page read and write
B84000
heap
page read and write
D31000
heap
page read and write
B86000
heap
page read and write
B7E000
heap
page read and write
DF0000
heap
page read and write
1AF96000
heap
page read and write
DF4000
heap
page read and write
E01000
heap
page read and write
1B14000
heap
page read and write
D31000
heap
page read and write
D6B000
heap
page read and write
953000
heap
page read and write
E01000
heap
page read and write
BF3000
heap
page read and write
23F2000
trusted library allocation
page read and write
D30000
heap
page read and write
DCF000
heap
page read and write
C2D000
heap
page read and write
4C0000
heap
page read and write
D70000
heap
page read and write
1B06000
heap
page read and write
1ACBC000
heap
page read and write
CB2000
heap
page read and write
DE0000
heap
page read and write
15DD000
heap
page read and write
D83000
heap
page read and write
C33000
heap
page read and write
DBC000
heap
page read and write
DCF000
heap
page read and write
D30000
heap
page read and write
DBC000
heap
page read and write
BEB000
heap
page read and write
D77000
heap
page read and write
9C5000
heap
page read and write
1B207000
heap
page read and write
DD0000
heap
page read and write
14E2000
heap
page read and write
C28000
heap
page read and write
DFC000
heap
page read and write
1B2B000
heap
page read and write
DAD000
heap
page read and write
DF0000
heap
page read and write
928000
heap
page read and write
1AE1000
heap
page read and write
DAD000
heap
page read and write
947000
heap
page read and write
1B125000
heap
page read and write
C05000
heap
page read and write
D98000
heap
page read and write
DE6000
heap
page read and write
D6D000
heap
page read and write
C01000
heap
page read and write
276E000
heap
page read and write
B7E000
heap
page read and write
1D20F000
heap
page read and write
1AED000
heap
page read and write
2442000
trusted library allocation
page read and write
D77000
heap
page read and write
E01000
heap
page read and write
D93000
heap
page read and write
C05000
heap
page read and write
DF4000
heap
page read and write
D91000
heap
page read and write
DE5000
heap
page read and write
C28000
heap
page read and write
1B06000
heap
page read and write
D83000
heap
page read and write
15F2000
heap
page read and write
4914000
heap
page read and write
279F000
heap
page read and write
E01000
heap
page read and write
1B12D000
heap
page read and write
2793000
heap
page read and write
964000
heap
page read and write
1AC9C000
heap
page read and write
B6C000
heap
page read and write
E01000
heap
page read and write
1B2B000
heap
page read and write
93B000
heap
page read and write
94C000
heap
page read and write
1AEB7000
heap
page read and write
DE0000
heap
page read and write
C2D000
heap
page read and write
7FF718641000
unkown
page readonly
1AFD000
heap
page read and write
964000
heap
page read and write
C28000
heap
page read and write
2103000
trusted library allocation
page read and write
2798000
heap
page read and write
1B48000
heap
page read and write
DE0000
heap
page read and write
B59000
heap
page read and write
B7D000
heap
page read and write
B74000
heap
page read and write
1AE1000
heap
page read and write
DE5000
heap
page read and write
C12000
heap
page read and write
242A000
trusted library allocation
page read and write
D98000
heap
page read and write
1B2C000
heap
page read and write
D36000
heap
page read and write
C03000
heap
page read and write
1B13E000
heap
page read and write
1AC59000
heap
page read and write
C41000
heap
page read and write
1B14000
heap
page read and write
D8B000
heap
page read and write
1AD2000
heap
page read and write
401000
unkown
page execute read
1438000
heap
page read and write
E01000
heap
page read and write
C2D000
heap
page read and write
D5F000
heap
page read and write
D93000
heap
page read and write
2A01000
heap
page read and write
D9D000
heap
page read and write
1B38000
heap
page read and write
D7C000
heap
page read and write
DD0000
heap
page read and write
DFC000
heap
page read and write
DAC000
heap
page read and write
29DD000
heap
page read and write
1B05000
heap
page read and write
DBC000
heap
page read and write
D4F000
heap
page read and write
D68000
heap
page read and write
D98000
heap
page read and write
1AFD000
heap
page read and write
B7D000
heap
page read and write
D72000
heap
page read and write
DCF000
heap
page read and write
C49000
heap
page read and write
DFC000
heap
page read and write
C28000
heap
page read and write
C2D000
heap
page read and write
964000
heap
page read and write
23DA000
trusted library allocation
page read and write
D93000
heap
page read and write
1AC9000
heap
page read and write
D98000
heap
page read and write
B86000
heap
page read and write
C1E000
heap
page read and write
B6C000
heap
page read and write
95D000
heap
page read and write
1611000
heap
page read and write
1872000
heap
page read and write
C28000
heap
page read and write
B1C000
heap
page read and write
1D162000
heap
page read and write
DF0000
heap
page read and write
2A60000
heap
page read and write
DCB000
heap
page read and write
2423000
trusted library allocation
page read and write
666F7000
unkown
page read and write
DD0000
heap
page read and write
DCF000
heap
page read and write
1AFBD000
heap
page read and write
9A9000
heap
page read and write
D98000
heap
page read and write
947000
heap
page read and write
D83000
heap
page read and write
D68000
heap
page read and write
1B38000
heap
page read and write
1A6D0000
heap
page read and write
B68000
heap
page read and write
2891000
heap
page read and write
937000
heap
page read and write
B86000
heap
page read and write
DCF000
heap
page read and write
1AE4000
heap
page read and write
937000
heap
page read and write
D83000
heap
page read and write
DF0000
heap
page read and write
9C5000
heap
page read and write
E8D000
heap
page read and write
D50000
heap
page read and write
2442000
trusted library allocation
page read and write
C2D000
heap
page read and write
DCB000
heap
page read and write
1B18000
heap
page read and write
DCF000
heap
page read and write
279F000
heap
page read and write
C02000
heap
page read and write
DD0000
heap
page read and write
B7D000
heap
page read and write
979000
heap
page read and write
1AF5000
heap
page read and write
275C000
heap
page read and write
DF0000
heap
page read and write
129D000
heap
page read and write
15ED000
heap
page read and write
947000
heap
page read and write
B59000
heap
page read and write
DA0000
heap
page read and write
7FF718640000
unkown
page read and write
1B2B000
heap
page read and write
94C000
heap
page read and write
D98000
heap
page read and write
23F2000
trusted library allocation
page read and write
1B06000
heap
page read and write
DFC000
heap
page read and write
C28000
heap
page read and write
7FF718632000
unkown
page readonly
123E000
heap
page read and write
C18000
heap
page read and write
28AE000
heap
page read and write
666FA000
unkown
page readonly
DD0000
heap
page read and write
DF0000
heap
page read and write
D83000
heap
page read and write
C35000
heap
page read and write
DF4000
heap
page read and write
DF0000
heap
page read and write
937000
heap
page read and write
94C000
heap
page read and write
DF0000
heap
page read and write
666F7000
unkown
page read and write
1AE1000
heap
page read and write
7FF718611000
unkown
page execute read
15E2000
heap
page read and write
7FF71863F000
unkown
page readonly
B84000
heap
page read and write
B84000
heap
page read and write
DE5000
heap
page read and write
D6D000
heap
page read and write
3715000
heap
page read and write
D84000
heap
page read and write
C2D000
heap
page read and write
E01000
heap
page read and write
279F000
heap
page read and write
D93000
heap
page read and write
1B11E000
heap
page read and write
DD0000
heap
page read and write
26B0000
heap
page read and write
1AF5000
heap
page read and write
15D1000
heap
page read and write
2442000
trusted library allocation
page read and write
D68000
heap
page read and write
C07000
heap
page read and write
DF4000
heap
page read and write
C1C000
heap
page read and write
D5F000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
9C5000
heap
page read and write
1B2C000
heap
page read and write
DF0000
heap
page read and write
8D1000
heap
page read and write
1AE1000
heap
page read and write
1A6BF000
heap
page read and write
278A000
heap
page read and write
5F0000
heap
page read and write
C35000
heap
page read and write
2790000
heap
page read and write
C28000
heap
page read and write
DCF000
heap
page read and write
B58000
heap
page read and write
C2D000
heap
page read and write
C16000
heap
page read and write
DE0000
heap
page read and write
D7C000
heap
page read and write
160C000
heap
page read and write
C35000
heap
page read and write
1AF38000
heap
page read and write
1CF50000
heap
page read and write
1AD2000
heap
page read and write
9C5000
heap
page read and write
D83000
heap
page read and write
1AFD000
heap
page read and write
DD0000
heap
page read and write
1AE5000
heap
page read and write
666F2000
unkown
page read and write
47CA000
heap
page read and write
23DA000
trusted library allocation
page read and write
1B17000
heap
page read and write
D50000
heap
page read and write
2423000
trusted library allocation
page read and write
B86000
heap
page read and write
1B177000
heap
page read and write
DBC000
heap
page read and write
DE3000
heap
page read and write
23DA000
trusted library allocation
page read and write
C33000
heap
page read and write
666F2000
unkown
page read and write
1B1A000
heap
page read and write
913000
heap
page read and write
1B250000
heap
page read and write
DF4000
heap
page read and write
DD0000
heap
page read and write
7FF718632000
unkown
page readonly
981000
heap
page read and write
1B06000
heap
page read and write
1B06000
heap
page read and write
953000
heap
page read and write
B84000
heap
page read and write
937000
heap
page read and write
23F2000
trusted library allocation
page read and write
E01000
heap
page read and write
B7E000
heap
page read and write
EE2000
heap
page read and write
C9E000
heap
page read and write
C47000
heap
page read and write
1D10C000
heap
page read and write
DF4000
heap
page read and write
C28000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
DE3000
heap
page read and write
9C5000
heap
page read and write
242A000
trusted library allocation
page read and write
DAC000
heap
page read and write
1AF1000
heap
page read and write
1AFD000
heap
page read and write
DF0000
heap
page read and write
1936000
heap
page read and write
1B2B000
heap
page read and write
937000
heap
page read and write
D7C000
heap
page read and write
15BD000
heap
page read and write
D7C000
heap
page read and write
D77000
heap
page read and write
DAC000
heap
page read and write
DFC000
heap
page read and write
DAC000
heap
page read and write
163E000
heap
page read and write
DE0000
heap
page read and write
BEC000
heap
page read and write
B5E000
heap
page read and write
1ACD000
heap
page read and write
D83000
heap
page read and write
1502000
heap
page read and write
DBC000
heap
page read and write
9C5000
heap
page read and write
1AE1000
heap
page read and write
279F000
heap
page read and write
15ED000
heap
page read and write
E01000
heap
page read and write
DE3000
heap
page read and write
1A60D000
heap
page read and write
B74000
heap
page read and write
D4F000
heap
page read and write
279F000
heap
page read and write
1AF2C000
heap
page read and write
1AF38000
heap
page read and write
DE0000
heap
page read and write
DF4000
heap
page read and write
91C000
heap
page read and write
DF4000
heap
page read and write
B7E000
heap
page read and write
1AEAE000
heap
page read and write
D0B000
heap
page read and write
1AF3C000
heap
page read and write
D7C000
heap
page read and write
C28000
heap
page read and write
D98000
heap
page read and write
8F6000
heap
page read and write
C28000
heap
page read and write
D3B000
heap
page read and write
1AE1000
heap
page read and write
DAC000
heap
page read and write
66706000
unkown
page readonly
D30000
heap
page read and write
DBC000
heap
page read and write
1B14000
heap
page read and write
666F2000
unkown
page read and write
DCF000
heap
page read and write
DE6000
heap
page read and write
93B000
heap
page read and write
1D1EF000
heap
page read and write
D73000
heap
page read and write
D83000
heap
page read and write
DFC000
heap
page read and write
D7F000
heap
page read and write
118F000
stack
page read and write
B68000
heap
page read and write
23DA000
trusted library allocation
page read and write
DE6000
heap
page read and write
162F000
stack
page read and write
D6D000
heap
page read and write
DBC000
heap
page read and write
D70000
heap
page read and write
1631000
heap
page read and write
7FF718640000
unkown
page write copy
1D076000
heap
page read and write
23D3000
trusted library allocation
page read and write
DCF000
heap
page read and write
D77000
heap
page read and write
1B20000
heap
page read and write
1623000
heap
page read and write
DF4000
heap
page read and write
2442000
trusted library allocation
page read and write
B74000
heap
page read and write
242A000
trusted library allocation
page read and write
7FF71863D000
unkown
page write copy
274C000
heap
page read and write
DCF000
heap
page read and write
964000
heap
page read and write
2793000
heap
page read and write
D4F000
heap
page read and write
947000
heap
page read and write
DFC000
heap
page read and write
D84000
heap
page read and write
C12000
heap
page read and write
88E000
heap
page read and write
C2D000
heap
page read and write
1AF5000
heap
page read and write
98A000
heap
page read and write
DCF000
heap
page read and write
DF4000
heap
page read and write
DE3000
heap
page read and write
9A9000
heap
page read and write
C49000
heap
page read and write
DCF000
heap
page read and write
DCB000
heap
page read and write
DF4000
heap
page read and write
C35000
heap
page read and write
2442000
trusted library allocation
page read and write
160C000
heap
page read and write
941000
heap
page read and write
2948000
heap
page read and write
9A9000
heap
page read and write
278A000
heap
page read and write
B7E000
heap
page read and write
C02000
heap
page read and write
B7E000
heap
page read and write
1ACCC000
heap
page read and write
1D1E9000
heap
page read and write
1AF1000
heap
page read and write
29DD000
heap
page read and write
1AE1000
heap
page read and write
D93000
heap
page read and write
1B74000
heap
page read and write
D7F000
heap
page read and write
E01000
heap
page read and write
DAC000
heap
page read and write
953000
heap
page read and write
D7C000
heap
page read and write
D2D000
heap
page read and write
DAC000
heap
page read and write
D6B000
heap
page read and write
1A535000
heap
page read and write
1627000
heap
page read and write
DBC000
heap
page read and write
1ADD000
heap
page read and write
1B2B000
heap
page read and write
2442000
trusted library allocation
page read and write
242A000
trusted library allocation
page read and write
23D3000
trusted library allocation
page read and write
C33000
heap
page read and write
DE5000
heap
page read and write
94C000
heap
page read and write
2790000
heap
page read and write
1AB8000
heap
page read and write
CA1000
heap
page read and write
7FF71863F000
unkown
page readonly
953000
heap
page read and write
DC1000
heap
page read and write
DBC000
heap
page read and write
DE0000
heap
page read and write
2423000
trusted library allocation
page read and write
DBC000
heap
page read and write
DE5000
heap
page read and write
964000
heap
page read and write
E01000
heap
page read and write
1614000
heap
page read and write
D98000
heap
page read and write
D2C000
heap
page read and write
B7E000
heap
page read and write
B68000
heap
page read and write
1AF17000
heap
page read and write
2790000
heap
page read and write
953000
heap
page read and write
D6F000
heap
page read and write
DBC000
heap
page read and write
278A000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
D31000
heap
page read and write
9C5000
heap
page read and write
1B06000
heap
page read and write
1438000
heap
page read and write
123F000
heap
page read and write
1B06000
heap
page read and write
953000
heap
page read and write
2782000
heap
page read and write
DF4000
heap
page read and write
DF0000
heap
page read and write
BF0000
heap
page read and write
1B14000
heap
page read and write
1B06000
heap
page read and write
1AED000
heap
page read and write
1B06000
heap
page read and write
D7F000
heap
page read and write
940000
heap
page read and write
1B18000
heap
page read and write
DFC000
heap
page read and write
DBC000
heap
page read and write
945000
heap
page read and write
DF0000
heap
page read and write
1A64D000
heap
page read and write
E01000
heap
page read and write
B84000
heap
page read and write
DCF000
heap
page read and write
B84000
heap
page read and write
DCF000
heap
page read and write
23DA000
trusted library allocation
page read and write
947000
heap
page read and write
1B14000
heap
page read and write
1AE2E000
heap
page read and write
1B2B000
heap
page read and write
1AF1000
heap
page read and write
1ACCC000
heap
page read and write
D77000
heap
page read and write
964000
heap
page read and write
D2F000
heap
page read and write
1AE1000
heap
page read and write
DBC000
heap
page read and write
1AFD000
heap
page read and write
5B98000
heap
page read and write
DBC000
heap
page read and write
147D000
heap
page read and write
7FF718641000
unkown
page readonly
1241000
heap
page read and write
964000
heap
page read and write
241A000
trusted library allocation
page read and write
12DA000
heap
page read and write
DE0000
heap
page read and write
1B12D000
heap
page read and write
92C000
heap
page read and write
E01000
heap
page read and write
DCF000
heap
page read and write
D7C000
heap
page read and write
B74000
heap
page read and write
D30000
heap
page read and write
C2D000
heap
page read and write
1281000
heap
page read and write
154E000
heap
page read and write
29F1000
heap
page read and write
DCF000
heap
page read and write
D7F000
heap
page read and write
15EF000
heap
page read and write
23F2000
trusted library allocation
page read and write
DE6000
heap
page read and write
B7E000
heap
page read and write
C1E000
heap
page read and write
DD0000
heap
page read and write
172C000
heap
page read and write
992000
heap
page read and write
C2F000
heap
page read and write
1AC8D000
heap
page read and write
D70000
heap
page read and write
EE2000
heap
page read and write
D7C000
heap
page read and write
946000
heap
page read and write
DF4000
heap
page read and write
2442000
trusted library allocation
page read and write
D68000
heap
page read and write
1A64D000
heap
page read and write
1B2B000
heap
page read and write
1AFD000
heap
page read and write
1B065000
heap
page read and write
DD0000
heap
page read and write
C2D000
heap
page read and write
275F000
heap
page read and write
160C000
heap
page read and write
C12000
heap
page read and write
DCF000
heap
page read and write
D77000
heap
page read and write
1D034000
heap
page read and write
DBC000
heap
page read and write
D07000
heap
page read and write
1AF1000
heap
page read and write
E01000
heap
page read and write
9A9000
heap
page read and write
D4F000
heap
page read and write
B70000
heap
page read and write
953000
heap
page read and write
D93000
heap
page read and write
937000
heap
page read and write
DCF000
heap
page read and write
DD0000
heap
page read and write
94C000
heap
page read and write
15D1000
heap
page read and write
275F000
heap
page read and write
2423000
trusted library allocation
page read and write
B86000
heap
page read and write
5B6F000
heap
page read and write
1B239000
heap
page read and write
D68000
heap
page read and write
C02000
heap
page read and write
D9D000
heap
page read and write
DBC000
heap
page read and write
DE0000
heap
page read and write
D83000
heap
page read and write
DE6000
heap
page read and write
179C000
heap
page read and write
160C000
heap
page read and write
152F000
stack
page read and write
D77000
heap
page read and write
9C5000
heap
page read and write
4ACF000
heap
page read and write
964000
heap
page read and write
2423000
trusted library allocation
page read and write
DE3000
heap
page read and write
D77000
heap
page read and write
1AAC000
heap
page read and write
26E4000
heap
page read and write
98A000
heap
page read and write
1825000
heap
page read and write
2423000
trusted library allocation
page read and write
1B06000
heap
page read and write
D2C000
heap
page read and write
FAB000
heap
page read and write
DE3000
heap
page read and write
9C5000
heap
page read and write
2793000
heap
page read and write
D70000
heap
page read and write
1B14000
heap
page read and write
964000
heap
page read and write
DE0000
heap
page read and write
DE0000
heap
page read and write
DF0000
heap
page read and write
94B000
heap
page read and write
242A000
trusted library allocation
page read and write
DE3000
heap
page read and write
D77000
heap
page read and write
BEC000
heap
page read and write
23AA000
trusted library allocation
page read and write
C35000
heap
page read and write
DE6000
heap
page read and write
1377000
heap
page read and write
1606000
heap
page read and write
DE3000
heap
page read and write
C28000
heap
page read and write
29CC000
heap
page read and write
C49000
heap
page read and write
23F2000
trusted library allocation
page read and write
DE3000
heap
page read and write
154D000
heap
page read and write
276E000
heap
page read and write
938000
heap
page read and write
1AD2000
heap
page read and write
C2D000
heap
page read and write
B7E000
heap
page read and write
DD0000
heap
page read and write
95D000
heap
page read and write
196D000
heap
page read and write
800000
heap
page read and write
2442000
trusted library allocation
page read and write
160A000
heap
page read and write
1AD1000
heap
page read and write
94C000
heap
page read and write
D70000
heap
page read and write
278A000
heap
page read and write
D7C000
heap
page read and write
C28000
heap
page read and write
91B000
heap
page read and write
C49000
heap
page read and write
C28000
heap
page read and write
E01000
heap
page read and write
160C000
heap
page read and write
1AF03000
heap
page read and write
1AE9F000
heap
page read and write
DF4000
heap
page read and write
DE6000
heap
page read and write
E01000
heap
page read and write
E01000
heap
page read and write
928000
heap
page read and write
2790000
heap
page read and write
C98000
heap
page read and write
1239000
heap
page read and write
BD7000
heap
page read and write
9A9000
heap
page read and write
DFC000
heap
page read and write
DF4000
heap
page read and write
D68000
heap
page read and write
B84000
heap
page read and write
1AD6000
heap
page read and write
D7C000
heap
page read and write
242A000
trusted library allocation
page read and write
1AEE6000
heap
page read and write
12C5000
heap
page read and write
DAC000
heap
page read and write
E01000
heap
page read and write
29DD000
heap
page read and write
629000
heap
page read and write
122D000
heap
page read and write
1606000
heap
page read and write
DE0000
heap
page read and write
E01000
heap
page read and write
275F000
heap
page read and write
992000
heap
page read and write
1AF2C000
heap
page read and write
C1E000
heap
page read and write
964000
heap
page read and write
981000
heap
page read and write
B68000
heap
page read and write
4DC0000
heap
page read and write
947000
heap
page read and write
5180000
heap
page read and write
C53000
heap
page read and write
23F2000
trusted library allocation
page read and write
275F000
heap
page read and write
DE3000
heap
page read and write
275F000
heap
page read and write
E01000
heap
page read and write
DBC000
heap
page read and write
7FF718610000
unkown
page readonly
275F000
heap
page read and write
1B06000
heap
page read and write
1B2C000
heap
page read and write
1AE1000
heap
page read and write
D31000
heap
page read and write
12C5000
heap
page read and write
14D3000
heap
page read and write
DCF000
heap
page read and write
9C5000
heap
page read and write
94C000
heap
page read and write
DBC000
heap
page read and write
1AE1F000
heap
page read and write
1405000
heap
page read and write
DE1000
heap
page read and write
B7E000
heap
page read and write
162F000
heap
page read and write
DCB000
heap
page read and write
DF4000
heap
page read and write
B70000
heap
page read and write
7FF718610000
unkown
page readonly
23F2000
trusted library allocation
page read and write
964000
heap
page read and write
C02000
heap
page read and write
1B2B000
heap
page read and write
275C000
heap
page read and write
1A6C7000
heap
page read and write
DEB000
heap
page read and write
2442000
trusted library allocation
page read and write
DE0000
heap
page read and write
D8B000
heap
page read and write
DE0000
heap
page read and write
DF0000
heap
page read and write
1AED000
heap
page read and write
C12000
heap
page read and write
242A000
trusted library allocation
page read and write
1AB8000
heap
page read and write
B86000
heap
page read and write
1AE1000
heap
page read and write
E01000
heap
page read and write
D98000
heap
page read and write
2442000
trusted library allocation
page read and write
D46000
heap
page read and write
D41000
heap
page read and write
DBC000
heap
page read and write
B68000
heap
page read and write
C28000
heap
page read and write
1AC3000
heap
page read and write
E01000
heap
page read and write
D91000
heap
page read and write
DBC000
heap
page read and write
1949000
heap
page read and write
D84000
heap
page read and write
1B14000
heap
page read and write
1B18000
heap
page read and write
D4F000
heap
page read and write
C28000
heap
page read and write
242A000
trusted library allocation
page read and write
DE0000
heap
page read and write
1AF1000
heap
page read and write
D84000
heap
page read and write
1B14000
heap
page read and write
C35000
heap
page read and write
8D6000
heap
page read and write
DFC000
heap
page read and write
1B18000
heap
page read and write
1A522000
heap
page read and write
1390000
heap
page read and write
DEB000
heap
page read and write
DD0000
heap
page read and write
C24000
heap
page read and write
D8B000
heap
page read and write
11D3000
heap
page read and write
1B48000
heap
page read and write
D98000
heap
page read and write
C49000
heap
page read and write
DD0000
heap
page read and write
C16000
heap
page read and write
66640000
unkown
page readonly
DF4000
heap
page read and write
C35000
heap
page read and write
C2D000
heap
page read and write
2423000
trusted library allocation
page read and write
DE3000
heap
page read and write
1AE6000
heap
page read and write
D7F000
heap
page read and write
E01000
heap
page read and write
C15000
heap
page read and write
93A000
heap
page read and write
B7C000
heap
page read and write
C12000
heap
page read and write
4B48000
heap
page read and write
96A000
heap
page read and write
B7E000
heap
page read and write
1AF5000
heap
page read and write
1837000
heap
page read and write
C49000
heap
page read and write
1AE5000
heap
page read and write
275F000
heap
page read and write
46B000
unkown
page readonly
D91000
heap
page read and write
7FF718611000
unkown
page execute read
DAC000
heap
page read and write
1AED000
heap
page read and write
275C000
heap
page read and write
DE6000
heap
page read and write
D68000
heap
page read and write
C28000
heap
page read and write
DCF000
heap
page read and write
2782000
heap
page read and write
B36000
heap
page read and write
D83000
heap
page read and write
DD0000
heap
page read and write
B58000
heap
page read and write
D71000
heap
page read and write
B68000
heap
page read and write
DE0000
heap
page read and write
B84000
heap
page read and write
93E000
heap
page read and write
DD0000
heap
page read and write
DCF000
heap
page read and write
DE0000
heap
page read and write
1B74000
heap
page read and write
DCF000
heap
page read and write
C16000
heap
page read and write
1871000
heap
page read and write
DFC000
heap
page read and write
2423000
trusted library allocation
page read and write
1942000
heap
page read and write
1AE1000
heap
page read and write
DE0000
heap
page read and write
DF4000
heap
page read and write
D77000
heap
page read and write
1AE1000
heap
page read and write
9A9000
heap
page read and write
1AE7000
heap
page read and write
1AD04000
heap
page read and write
13E1000
heap
page read and write
D84000
heap
page read and write
DBC000
heap
page read and write
E01000
heap
page read and write
1AD4000
heap
page read and write
DF0000
heap
page read and write
1AD1000
heap
page read and write
1B1C000
heap
page read and write
B5B000
heap
page read and write
14E0000
heap
page read and write
C53000
heap
page read and write
DE0000
heap
page read and write
1AFD000
heap
page read and write
B86000
heap
page read and write
5B0000
heap
page read and write
1627000
heap
page read and write
1D06E000
heap
page read and write
DF0000
heap
page read and write
29DD000
heap
page read and write
1ADA0000
heap
page read and write
1B2B000
heap
page read and write
DF0000
heap
page read and write
DFC000
heap
page read and write
1AF20000
heap
page read and write
D70000
heap
page read and write
975000
heap
page read and write
1AE5000
heap
page read and write
C28000
heap
page read and write
C35000
heap
page read and write
E01000
heap
page read and write
D83000
heap
page read and write
B86000
heap
page read and write
D73000
heap
page read and write
2790000
heap
page read and write
943000
heap
page read and write
1D142000
heap
page read and write
964000
heap
page read and write
2423000
trusted library allocation
page read and write
1B06000
heap
page read and write
1AB8000
heap
page read and write
1AE1000
heap
page read and write
DAC000
heap
page read and write
94B000
heap
page read and write
DF0000
heap
page read and write
15D1000
heap
page read and write
B84000
heap
page read and write
964000
heap
page read and write
DAC000
heap
page read and write
C19000
heap
page read and write
DAC000
heap
page read and write
15B6000
heap
page read and write
2797000
heap
page read and write
E01000
heap
page read and write
DF0000
heap
page read and write
D68000
heap
page read and write
DD0000
heap
page read and write
D31000
heap
page read and write
DE5000
heap
page read and write
DD0000
heap
page read and write
C11000
heap
page read and write
B68000
heap
page read and write
B58000
heap
page read and write
1B14000
heap
page read and write
D30000
heap
page read and write
E01000
heap
page read and write
1AF03000
heap
page read and write
1AC51000
heap
page read and write
DFC000
heap
page read and write
1D12A000
heap
page read and write
DCF000
heap
page read and write
1B38000
heap
page read and write
19B0000
heap
page read and write
DFC000
heap
page read and write
DD0000
heap
page read and write
2423000
trusted library allocation
page read and write
15FD000
heap
page read and write
1AA4000
heap
page read and write
DF4000
heap
page read and write
192E000
heap
page read and write
E01000
heap
page read and write
D7C000
heap
page read and write
C3A000
heap
page read and write
19B2000
heap
page read and write
96B000
heap
page read and write
DF4000
heap
page read and write
D60000
heap
page read and write
B5B000
heap
page read and write
1209000
heap
page read and write
1B125000
heap
page read and write
1D085000
heap
page read and write
DBC000
heap
page read and write
B7E000
heap
page read and write
1AED000
heap
page read and write
E01000
heap
page read and write
D91000
heap
page read and write
B6C000
heap
page read and write
29DD000
heap
page read and write
DCF000
heap
page read and write
1B06E000
heap
page read and write
DBC000
heap
page read and write
DFC000
heap
page read and write
BDF000
heap
page read and write
DD0000
heap
page read and write
D60000
heap
page read and write
D98000
heap
page read and write
96C000
heap
page read and write
928000
heap
page read and write
1AE1000
heap
page read and write
C33000
heap
page read and write
B44000
heap
page read and write
1D11A000
heap
page read and write
7FF718610000
unkown
page readonly
964000
heap
page read and write
964000
heap
page read and write
DFC000
heap
page read and write
DF4000
heap
page read and write
944000
heap
page read and write
15E2000
heap
page read and write
957000
heap
page read and write
DD0000
heap
page read and write
DCB000
heap
page read and write
DF0000
heap
page read and write
C49000
heap
page read and write
1AFD000
heap
page read and write
964000
heap
page read and write
D98000
heap
page read and write
C28000
heap
page read and write
DCB000
heap
page read and write
D68000
heap
page read and write
C02000
heap
page read and write
94C000
heap
page read and write
C28000
heap
page read and write
DEB000
heap
page read and write
B86000
heap
page read and write
DE3000
heap
page read and write
D7F000
heap
page read and write
E01000
heap
page read and write
9A9000
heap
page read and write
12DF000
heap
page read and write
C03000
heap
page read and write
DF0000
heap
page read and write
B68000
heap
page read and write
277E000
heap
page read and write
DCB000
heap
page read and write
1B14000
heap
page read and write
DF4000
heap
page read and write
D80000
heap
page read and write
279F000
heap
page read and write
DD0000
heap
page read and write
DE3000
heap
page read and write
B84000
heap
page read and write
DE0000
heap
page read and write
B59000
heap
page read and write
DAC000
heap
page read and write
DC1000
heap
page read and write
7FF718632000
unkown
page readonly
2807000
heap
page read and write
2423000
trusted library allocation
page read and write
1B58000
heap
page read and write
1B14000
heap
page read and write
C28000
heap
page read and write
DBC000
heap
page read and write
1438000
heap
page read and write
964000
heap
page read and write
B84000
heap
page read and write
E01000
heap
page read and write
1402000
heap
page read and write
D7C000
heap
page read and write
There are 9109 hidden memdumps, click here to show them.